docker-compose-files/hyperledger_fabric/v2.0.0/raft/logs/dev_peer0.log

7.4 MiB
Raw Blame History

2020-02-22 00:13:32.783 UTC [bccsp] GetDefault -> DEBU 001 Before using BCCSP, please call InitFactories(). Falling back to bootBCCSP.
2020-02-22 00:13:32.957 UTC [bccsp] GetDefault -> DEBU 002 Before using BCCSP, please call InitFactories(). Falling back to bootBCCSP.
[003 02-22 00:13:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done
[004 02-22 00:13:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW]
[005 02-22 00:13:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts
[006 02-22 00:13:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem
[007 02-22 00:13:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts
[008 02-22 00:13:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem
[009 02-22 00:13:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts
[00a 02-22 00:13:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts
[00b 02-22 00:13:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory]
[00c 02-22 00:13:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts
[00d 02-22 00:13:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem
[00e 02-22 00:13:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts
[00f 02-22 00:13:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory]
[010 02-22 00:13:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls
[011 02-22 00:13:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory]
[012 02-22 00:13:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs
[013 02-22 00:13:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[014 02-22 00:13:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[015 02-22 00:13:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP
[016 02-22 00:13:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP
[017 02-22 00:13:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[018 02-22 00:13:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[019 02-22 00:13:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[01a 02-22 00:13:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2029-12-25 00:51:00 +0000 UTC
[01b 02-22 00:13:33.15 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer:
Version: 2.0.0
Commit SHA: development build
Go version: go1.13.8
OS/Arch: linux/amd64
Chaincode:
Base Docker Namespace: hyperledger
Base Docker Label: org.hyperledger.fabric
Docker Namespace: hyperledger
[01c 02-22 00:13:33.15 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.5:7051
[01d 02-22 00:13:33.15 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051
[01e 02-22 00:13:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity
[01f 02-22 00:13:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000
[020 02-22 00:13:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925
[021 02-22 00:13:33.21 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled
[022 02-22 00:13:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientstore/]
[023 02-22 00:13:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientstore/] does not exist
[024 02-22 00:13:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientstore/] exists
[025 02-22 00:13:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Checking for db format at path [/var/hyperledger/production/transientstore]
[026 02-22 00:13:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU format is latest, nothing to do
[027 02-22 00:13:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity
[028 02-22 00:13:33.42 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051
[029 02-22 00:13:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[02a 02-22 00:13:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[02b 02-22 00:13:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[02c 02-22 00:13:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[02d 02-22 00:13:33.43 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9, Metadata:
[02e 02-22 00:13:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01D7060A20C4A11870756AF4C8...455254494649434154452D2D2D2D2D0A
[02f 02-22 00:13:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0EE887BBCA249FB4C543B2B40CFAC0AB4555C9F7C11A5E22117153236FD0F6F8
[030 02-22 00:13:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Added ġpuj<75><6A>|[ZZ<5A><16>͏9<CD8F><39><EFBFBD><EFBFBD><EFBFBD>Ɗ<EFBFBD><C68A><EFBFBD>, total items: 1
[031 02-22 00:13:33.44 UTC] [%{longpkg}] %{callpath} -> INFO Initializing LedgerMgr
[032 02-22 00:13:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/]
[033 02-22 00:13:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist
[034 02-22 00:13:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists
[035 02-22 00:13:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[036 02-22 00:13:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s
[037 02-22 00:13:33.44 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org1.example.com:7051 started
[038 02-22 00:13:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself
[039 02-22 00:13:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s
[03a 02-22 00:13:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A
[03b 02-22 00:13:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CA28792DD5AF6EEE6DFC3A3E677C364E5FCDF2273D9E68A5E6032472B1FACDC5
[03c 02-22 00:13:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[03d 02-22 00:13:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[03e 02-22 00:13:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/]
[03f 02-22 00:13:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist
[040 02-22 00:13:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists
[041 02-22 00:13:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/]
[042 02-22 00:13:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist
[043 02-22 00:13:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists
[044 02-22 00:13:33.50 UTC] [%{longpkg}] %{callpath} -> INFO DB is empty Setting db format as 2.0
[045 02-22 00:13:33.51 UTC] [%{longpkg}] %{callpath} -> INFO Creating new file ledger directory at /var/hyperledger/production/ledgersData/chains/chains
[046 02-22 00:13:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/]
[047 02-22 00:13:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist
[048 02-22 00:13:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists
[049 02-22 00:13:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Checking for db format at path [/var/hyperledger/production/ledgersData/pvtdataStore]
[04a 02-22 00:13:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU format is latest, nothing to do
[04b 02-22 00:13:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb
[04c 02-22 00:13:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/]
[04d 02-22 00:13:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist
[04e 02-22 00:13:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists
[04f 02-22 00:13:33.54 UTC] [%{longpkg}] %{callpath} -> INFO DB is empty Setting db format as 2.0
[050 02-22 00:13:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory
[051 02-22 00:13:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/]
[052 02-22 00:13:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist
[053 02-22 00:13:33.54 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists
[054 02-22 00:13:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Checking for db format at path [/var/hyperledger/production/ledgersData/configHistory]
[055 02-22 00:13:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU format is latest, nothing to do
[056 02-22 00:13:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/]
[057 02-22 00:13:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist
[058 02-22 00:13:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists
[059 02-22 00:13:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Checking for db format at path [/var/hyperledger/production/ledgersData/bookkeeper]
[05a 02-22 00:13:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU format is latest, nothing to do
[05b 02-22 00:13:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb
[05c 02-22 00:13:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/]
[05d 02-22 00:13:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist
[05e 02-22 00:13:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists
[05f 02-22 00:13:33.65 UTC] [%{longpkg}] %{callpath} -> INFO DB is empty Setting db format as 2.0
[060 02-22 00:13:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger
[061 02-22 00:13:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery
[062 02-22 00:13:33.73 UTC] [%{longpkg}] %{callpath} -> INFO Initialized LedgerMgr
[063 02-22 00:13:33.73 UTC] [%{longpkg}] %{callpath} -> INFO Initialized lifecycle cache with 0 already installed chaincodes
[064 02-22 00:13:33.73 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com
[065 02-22 00:13:33.73 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org1.example.com:7052
[066 02-22 00:13:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer
[067 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> INFO deploying system chaincode 'lscc'
[068 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU starting chaincode-support stream for lscc.syscc
[069 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc.syscc
[06a 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created
[06b 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created
[06c 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc.syscc
[06d 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = lscc.syscc, sending back REGISTERED
[06e 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for lscc.syscc
[06f 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode lscc.syscc
[070 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode lscc.syscc
[071 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> INFO deploying system chaincode 'cscc'
[072 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc.syscc
[073 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU starting chaincode-support stream for cscc.syscc
[074 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created
[075 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created
[076 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc.syscc
[077 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = cscc.syscc, sending back REGISTERED
[078 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for cscc.syscc
[079 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode cscc.syscc
[07a 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode cscc.syscc
[07b 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> INFO deploying system chaincode 'qscc'
[07c 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc.syscc
[07d 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU starting chaincode-support stream for qscc.syscc
[07e 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created
[07f 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created
[080 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc.syscc
[081 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = qscc.syscc, sending back REGISTERED
[082 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for qscc.syscc
[083 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode qscc.syscc
[084 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode qscc.syscc
[085 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> INFO deploying system chaincode '_lifecycle'
[086 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for _lifecycle.syscc
[087 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU starting chaincode-support stream for _lifecycle.syscc
[088 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created
[089 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created
[08a 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode _lifecycle.syscc
[08b 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = _lifecycle.syscc, sending back REGISTERED
[08c 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for _lifecycle.syscc
[08d 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode _lifecycle.syscc
[08e 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode _lifecycle.syscc
[08f 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes
[090 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000
[091 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated
[092 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[peer0.org1.example.com], network ID=[dev], address=[peer0.org1.example.com:7051]
[093 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[peer0.org1.example.com], network ID=[dev], address=[peer0.org1.example.com:7051]
[094 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]
[095 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Loading Pre-reset heights
[096 02-22 00:13:33.78 UTC] [%{longpkg}] %{callpath} -> INFO No active channels passed
[097 02-22 00:13:33.82 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-02-22T00:13:35.801Z grpc.peer_address=172.18.0.6:53984 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=17.5361ms
[098 02-22 00:13:33.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[099 02-22 00:13:33.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[09a 02-22 00:13:33.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:53984
[09b 02-22 00:13:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"g2C\276J/\372pf\335\366\027\264\203\023\251\344S\337&\265*/\336/\t\264UU{F\310" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\335}\274\246u\3009v\251\rJG\302\340\263@\370\313\341?\326!3\350\023\320{\335\206\341V" from 172.18.0.6:53984
[09c 02-22 00:13:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[09d 02-22 00:13:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[09e 02-22 00:13:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[09f 02-22 00:13:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[0a0 02-22 00:13:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[0a1 02-22 00:13:33.87 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-02-22T00:13:35.87Z grpc.peer_address=172.18.0.6:53986 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=181.9µs
[0a2 02-22 00:13:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[0a3 02-22 00:13:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[0a4 02-22 00:13:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQQIM2ou9DqfvkKtiUOZHklTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEI9vXO2dg2ogF\n9G7NkteaJapySU671RiKcInNv3OAdIr+xsn11Wf7TM694Ow7/GWsGU71oZTZbHfw\ni5SfKlabMqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAg0y4VvcZCLdSplahOGKT05hcJiRUeoqVmEQhWb+p7yNEwCgYIKoZIzj0E\nAwIDRwAwRAIgHtaqhr9/bxigCyhuKqYqDztw3uE11quIZ7drkaY/mvQCIGVtipl+\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:53986
[0a5 02-22 00:13:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c 98 cf f0 20 c7 d9 fd b9 ce d3 17 55 85 70 70 |,... .......U.pp|
00000010 b3 08 3a 82 2a 57 3b dc 6d e0 0c aa 7c 99 d3 24 |..:.*W;.m...|..$|
[0a6 02-22 00:13:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 8a 93 e8 6f 91 48 fc f9 a5 7a 20 |0D. N...o.H...z |
00000010 32 4a f0 df bb 91 2b 3c 25 1e d4 d1 fe 24 d2 5f |2J....+<%....$._|
00000020 30 d9 fc 95 02 20 73 1a 25 b7 f5 15 28 49 3b 14 |0.... s.%...(I;.|
00000030 2b fe e0 2f 5c 60 3c 27 a4 5d 4b a1 4a c5 30 4c |+../\`<'.]K.J.0L|
00000040 da b2 8c 3b 9a f8 |...;..|
[0a7 02-22 00:13:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:53984
[0a8 02-22 00:13:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:53984
[0a9 02-22 00:13:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[0aa 02-22 00:13:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:53984 disconnected
[0ab 02-22 00:13:33.87 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-02-22T00:13:43.839Z grpc.peer_address=172.18.0.6:53984 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.9893ms
[0ac 02-22 00:13:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[0ad 02-22 00:13:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"g2C\276J/\372pf\335\366\027\264\203\023\251\344S\337&\265*/\336/\t\264UU{F\310" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\335}\274\246u\3009v\251\rJG\302\340\263@\370\313\341?\326!3\350\023\320{\335\206\341V" from 172.18.0.6:53986
[0ae 02-22 00:13:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c 98 cf f0 20 c7 d9 fd b9 ce d3 17 55 85 70 70 |,... .......U.pp|
00000010 b3 08 3a 82 2a 57 3b dc 6d e0 0c aa 7c 99 d3 24 |..:.*W;.m...|..$|
[0af 02-22 00:13:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db bc c5 93 66 db 6d 21 92 3f 59 |0E.!.....f.m!.?Y|
00000010 8a ef c6 ac fb 10 ff aa 22 a0 d2 cc 40 fd d0 e2 |........"...@...|
00000020 40 20 ea 1e 57 02 20 3e 11 85 b5 3b 64 b2 b1 2f |@ ..W. >...;d../|
00000030 81 29 22 74 b2 7e d4 00 0d 85 06 aa 06 53 ee 8f |.)"t.~.......S..|
00000040 eb bf 03 bd f6 a3 5a |......Z|
[0b0 02-22 00:13:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:53986
[0b1 02-22 00:13:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:53986
[0b2 02-22 00:13:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 2231762192437802793, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1108 bytes, Signature: 0 bytes
[0b3 02-22 00:13:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0b4 02-22 00:13:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 2231762192437802793, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1108 bytes, Signature: 0 bytes
[0b5 02-22 00:13:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 e5 4b 64 f3 5a 58 2f 30 1e d7 40 11 ad 24 df |".Kd.ZX/0..@..$.|
00000010 89 56 8c 5d 43 a3 ba 41 5b db 25 ea 13 88 c5 ef |.V.]C..A[.%.....|
[0b6 02-22 00:13:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 aa 62 89 cd 27 10 de 89 f7 7a 26 |0D. 2.b..'....z&|
00000010 da c4 88 6c 9d 99 75 07 72 fa 99 51 e9 1c 98 29 |...l..u.r..Q...)|
00000020 30 1a b6 13 02 20 38 c4 1d ac a7 53 d0 1a ad 4f |0.... 8....S...O|
00000030 d4 27 50 98 25 3a 67 b5 1d 3b 0d 3e 26 98 f3 e6 |.'P.%:g..;.>&...|
00000040 af 4d e6 a6 c2 c6 |.M....|
[0b7 02-22 00:13:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[0b8 02-22 00:13:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c8 11 2b 57 f7 fc a2 00 b5 0d f3 |0E.!...+W.......|
00000010 ad f5 f0 4e 9e ee fb 16 70 5d 36 3d 9f 12 13 7e |...N....p]6=...~|
00000020 14 24 b6 da d9 02 20 2f 6b 6e 89 46 8f 59 cc 37 |.$.... /kn.F.Y.7|
00000030 26 90 e2 36 bf 06 67 9f 40 6d 44 c9 76 af 15 43 |&..6..g.@mD.v..C|
00000040 a8 6a be b1 92 0a 51 |.j....Q|
[0b9 02-22 00:13:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[0ba 02-22 00:13:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]}
[0bb 02-22 00:13:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[0bc 02-22 00:13:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0bd 02-22 00:13:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0be 02-22 00:13:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0bf 02-22 00:13:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[0c0 02-22 00:13:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A
[0c1 02-22 00:13:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DEBB639DC877213170C365C3AE1A2653377628F3983B356CBB5145360FB7BEF6
[0c2 02-22 00:13:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[0c3 02-22 00:13:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[0c4 02-22 00:13:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 2231762192437802793, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2198 bytes, Signature: 0 bytes to 1 peers
[0c5 02-22 00:13:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[0c6 02-22 00:13:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 2231762192437802793, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2198 bytes, Signature: 0 bytes
[0c7 02-22 00:13:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0c8 02-22 00:13:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:4099196302387415856 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[0c9 02-22 00:13:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:4099196302387415856 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[0ca 02-22 00:13:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[0cb 02-22 00:13:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0cc 02-22 00:13:37.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[0cd 02-22 00:13:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:11937856552092617951 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[0ce 02-22 00:13:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:11937856552092617951 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[0cf 02-22 00:13:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0d0 02-22 00:13:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1097 bytes, Signature: 0 bytes
[0d1 02-22 00:13:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0d2 02-22 00:13:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1097 bytes, Signature: 0 bytes
[0d3 02-22 00:13:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 35 a9 83 85 d2 31 63 4c c4 ca 94 a5 97 b3 b4 |.5....1cL.......|
00000010 7c f1 08 04 a0 e5 1a fc c1 1b d6 d3 a6 f0 11 ea ||...............|
[0d4 02-22 00:13:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 a9 cf 14 48 a1 4b 0b ff 69 4c 29 |0D. 7...H.K..iL)|
00000010 f4 4a ee 1b e0 4d a3 e6 d4 37 21 c5 f6 63 0b 86 |.J...M...7!..c..|
00000020 9f f3 13 8f 02 20 78 dd 47 8c 22 44 63 37 bc 04 |..... x.G."Dc7..|
00000030 1b 14 d2 b4 ba 72 6f 93 c7 6f 67 e7 9c d7 5c 42 |.....ro..og...\B|
00000040 87 85 3c 21 54 66 |..<!Tf|
[0d5 02-22 00:13:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[0d6 02-22 00:13:37.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 45 8d 36 06 ce ad f9 95 a8 e3 72 |0D. ME.6.......r|
00000010 64 74 38 b2 09 c9 e8 05 29 ce 8a 5e 6b d3 09 76 |dt8.....)..^k..v|
00000020 a6 78 82 b9 02 20 0f 23 e7 0d ad 20 a2 e9 e9 bf |.x... .#... ....|
00000030 2b 93 e1 39 b1 a7 ed f2 cb db c7 03 ce b2 a3 21 |+..9...........!|
00000040 4d 23 b7 73 4c 77 |M#.sLw|
[0d7 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----
MIICKDCCAc+gAwIBAgIRAL6UJxau6L+P+ZjjcRQ8/hAwCgYIKoZIzj0EAwIwczEL
MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkxMjI4MDA1MTAwWhcNMjkxMjI1MDA1MTAw
WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn
MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABIt57ZsKprUf
gQupDXqXcUNj/QolNEuRxscKeayhIlyjnmcQ/wA2ymmIlxXZjfkvNYq2LSz43Grd
VVFaNiJbFXujTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud
IwQkMCKAINMuFb3GQi3UqZWoThik9OYXCYkVHqKlZhEIVm/qe8jRMAoGCCqGSM49
BAMCA0cAMEQCIA1SKdLR6URj5OwCzKZhR4V/TOGLsL77sYN8KeuvY1GSAiBPsdGr
2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==
-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[0d8 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[0d9 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:4
[0da 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:4
[0db 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[0dc 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0dd 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0de 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0df 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[0e0 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A
[0e1 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4A782FED3CB02829BD9FA8AA960C85EC859200C312ADBD0DAD23136BA180674A
[0e2 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[0e3 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[0e4 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes to 1 peers
[0e5 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[0e6 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes
[0e7 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0e8 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11937856552092617951 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 51 bytes, Signature: 0 bytes
[0e9 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11937856552092617951 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 51 bytes, Signature: 0 bytes
[0ea 02-22 00:13:37.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0eb 02-22 00:13:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A
[0ec 02-22 00:13:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0C872F4E73FF4F9532BF232E51FFBEDCCEE1B1A61EF490474DB6BAC7F3E422E7
[0ed 02-22 00:13:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[0ee 02-22 00:13:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[0ef 02-22 00:13:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413438745000 seq_num:5 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers
[0f0 02-22 00:13:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413438745000 seq_num:5 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1094 bytes, Signature: 0 bytes
[0f1 02-22 00:13:37.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0f2 02-22 00:13:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes
[0f3 02-22 00:13:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0f4 02-22 00:13:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes
[0f5 02-22 00:13:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c 87 2f 4e 73 ff 4f 95 32 bf 23 2e 51 ff be dc |../Ns.O.2.#.Q...|
00000010 ce e1 b1 a6 1e f4 90 47 4d b6 ba c7 f3 e4 22 e7 |.......GM.....".|
[0f6 02-22 00:13:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 29 3e b7 28 90 59 0f af 67 9e 76 |0D. [)>.(.Y..g.v|
00000010 22 34 3b 98 32 a8 51 68 e0 a8 01 97 ee 26 3c 20 |"4;.2.Qh.....&< |
00000020 24 57 3e 55 02 20 11 da 43 0b 1b 78 26 2b 25 06 |$W>U. ..C..x&+%.|
00000030 b1 8d 34 e1 8a 67 fc 63 31 a6 4b dd 85 0f 02 8b |..4..g.c1.K.....|
00000040 a1 bf b5 60 42 7d |...`B}|
[0f7 02-22 00:13:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[0f8 02-22 00:13:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 70 91 a7 3a d1 2c c3 7a 44 89 |0E.!..p..:.,.zD.|
00000010 74 e1 33 25 fc 75 34 22 f7 06 de 69 b0 2d a4 50 |t.3%.u4"...i.-.P|
00000020 d9 d4 29 bb cb 02 20 34 3e 10 52 ed 92 26 01 e6 |..)... 4>.R..&..|
00000030 e9 ab 5e 23 94 85 a0 12 3f dc da 39 14 2d 9d 1a |..^#....?..9.-..|
00000040 ba e4 0d 66 6c c8 7a |...fl.z|
[0f9 02-22 00:13:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413438745000 seq_num:5 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[0fa 02-22 00:13:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413438745000 seq_num:5 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[0fb 02-22 00:13:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[0fc 02-22 00:13:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 b5 7f 1c 0b fe 73 77 da 76 08 42 c4 bc f6 6f |......sw.v.B...o|
00000010 20 94 d3 3e c2 2b ee 0c 1d eb 86 8e 78 68 66 7e | ..>.+......xhf~|
[0fd 02-22 00:13:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 a0 10 c9 f5 29 ac 66 3b 12 36 30 |0D. A....).f;.60|
00000010 9b 3a 2d 63 0d eb 83 a2 2e a3 8c 1f f5 1a da f2 |.:-c............|
00000020 93 41 db 5b 02 20 4c 28 b4 01 a0 cf 40 c8 6e b0 |.A.[. L(....@.n.|
00000030 66 ff a1 62 72 d1 29 9d b6 e5 a8 61 27 6e c4 f6 |f..br.)....a'n..|
00000040 45 d3 45 b4 8e 96 |E.E...|
[0fe 02-22 00:13:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[0ff 02-22 00:13:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 17 8e c0 00 39 ab d7 ba 7c 5e dc c4 |0D. ....9...|^..|
00000010 c1 77 15 91 10 80 af cc 7d ea f6 e9 76 69 a8 74 |.w......}...vi.t|
00000020 14 8c 3b 9c 02 20 17 62 bd ed 15 9d ca 67 77 e0 |..;.. .b.....gw.|
00000030 ba 2e f0 a5 0d bd 00 0e a5 91 a9 ed 20 a2 3e f6 |............ .>.|
00000040 f8 62 94 73 dd 9e |.b.s..|
[100 02-22 00:13:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[101 02-22 00:13:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----
MIICKDCCAc+gAwIBAgIRAL6UJxau6L+P+ZjjcRQ8/hAwCgYIKoZIzj0EAwIwczEL
MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkxMjI4MDA1MTAwWhcNMjkxMjI1MDA1MTAw
WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn
MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABIt57ZsKprUf
gQupDXqXcUNj/QolNEuRxscKeayhIlyjnmcQ/wA2ymmIlxXZjfkvNYq2LSz43Grd
VVFaNiJbFXujTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud
IwQkMCKAINMuFb3GQi3UqZWoThik9OYXCYkVHqKlZhEIVm/qe8jRMAoGCCqGSM49
BAMCA0cAMEQCIA1SKdLR6URj5OwCzKZhR4V/TOGLsL77sYN8KeuvY1GSAiBPsdGr
2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==
-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[102 02-22 00:13:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----
MIICKDCCAc+gAwIBAgIRAL6UJxau6L+P+ZjjcRQ8/hAwCgYIKoZIzj0EAwIwczEL
MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkxMjI4MDA1MTAwWhcNMjkxMjI1MDA1MTAw
WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn
MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABIt57ZsKprUf
gQupDXqXcUNj/QolNEuRxscKeayhIlyjnmcQ/wA2ymmIlxXZjfkvNYq2LSz43Grd
VVFaNiJbFXujTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud
IwQkMCKAINMuFb3GQi3UqZWoThik9OYXCYkVHqKlZhEIVm/qe8jRMAoGCCqGSM49
BAMCA0cAMEQCIA1SKdLR6URj5OwCzKZhR4V/TOGLsL77sYN8KeuvY1GSAiBPsdGr
2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==
-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:5
[103 02-22 00:13:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:5
[104 02-22 00:13:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[105 02-22 00:13:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[106 02-22 00:13:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[107 02-22 00:13:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[108 02-22 00:13:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 4099196302387415856 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 50 bytes, Signature: 0 bytes
[109 02-22 00:13:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 4099196302387415856 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 50 bytes, Signature: 0 bytes
[10a 02-22 00:13:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[10b 02-22 00:13:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[10c 02-22 00:13:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A
[10d 02-22 00:13:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E67E14AECD7D553A50147F5DF47CE73A6D3FAE504CFD27809621692D323CFF56
[10e 02-22 00:13:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[10f 02-22 00:13:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[110 02-22 00:13:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[111 02-22 00:13:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Org1MSP-----BEGIN CERTIFICATE-----
MIICJzCCAc6gAwIBAgIQQIM2ou9DqfvkKtiUOZHklTAKBggqhkjOPQQDAjBzMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
b3JnMS5leGFtcGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBa
MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEI9vXO2dg2ogF
9G7NkteaJapySU671RiKcInNv3OAdIr+xsn11Wf7TM694Ow7/GWsGU71oZTZbHfw
i5SfKlabMqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
BCQwIoAg0y4VvcZCLdSplahOGKT05hcJiRUeoqVmEQhWb+p7yNEwCgYIKoZIzj0E
AwIDRwAwRAIgHtaqhr9/bxigCyhuKqYqDztw3uE11quIZ7drkaY/mvQCIGVtipl+
O8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ
-----END CERTIFICATE-----
Timestamp:inc_num:1582330413438745000 seq_num:6 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[112 02-22 00:13:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413438745000 seq_num:6 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[113 02-22 00:13:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[114 02-22 00:13:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to peer1.org1.example.com:7051
[115 02-22 00:13:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 11937856552092617951 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 51 bytes, Signature: 0 bytes to 1 peers
[116 02-22 00:13:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 11937856552092617951 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 51 bytes, Signature: 0 bytes
[117 02-22 00:13:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[118 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 11937856552092617951, Envelope: 961 bytes, Signature: 0 bytes
[119 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 1e 21 22 70 7f f1 ef d0 c9 5a 11 93 14 18 c9 |B.!"p.....Z.....|
00000010 bb 8d e5 38 1f 61 ce 39 73 95 de 3c c4 ff 92 f3 |...8.a.9s..<....|
[11a 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 a6 65 a3 d3 07 df 21 e4 7e 77 04 |0D. A.e....!.~w.|
00000010 53 ab d7 08 9c e2 35 5c dc 44 4a 90 82 5c 90 de |S.....5\.DJ..\..|
00000020 b5 8d 07 48 02 20 44 ba 6e 40 28 f9 72 e3 11 83 |...H. D.n@(.r...|
00000030 26 1f 28 1b 79 dc 0f 0a bb a5 4e 1f 96 0f 5e 09 |&.(.y.....N...^.|
00000040 e0 22 b8 6d 1f 64 |.".m.d|
[11b 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 11937856552092617951, Envelope: 961 bytes, Signature: 0 bytes
[11c 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 76 54 85 74 120 97 117 54 76 43 80 43 90 106 106 99 82 81 56 47 104 65 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 84 107 120 77 106 73 52 77 68 65 49 77 84 65 119 87 104 99 78 77 106 107 120 77 106 73 49 77 68 65 49 77 84 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 69 117 98 51 74 110 10 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 73 116 53 55 90 115 75 112 114 85 102 10 103 81 117 112 68 88 113 88 99 85 78 106 47 81 111 108 78 69 117 82 120 115 99 75 101 97 121 104 73 108 121 106 110 109 99 81 47 119 65 50 121 109 109 73 108 120 88 90 106 102 107 118 78 89 113 50 76 83 122 52 51 71 114 100 10 86 86 70 97 78 105 74 98 70 88 117 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 78 77 117 70 98 51 71 81 105 51 85 113 90 87 111 84 104 105 107 57 79 89 88 67 89 107 86 72 113 75 108 90 104 69 73 86 109 47 113 101 56 106 82 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 65 49 83 75 100 76 82 54 85 82 106 53 79 119 67 122 75 90 104 82 52 86 47 84 79 71 76 115 76 55 55 115 89 78 56 75 101 117 118 89 49 71 83 65 105 66 80 115 100 71 114 10 50 86 52 54 78 122 76 111 67 109 56 115 65 88 75 89 65 75 112 57 75 81 116 65 78 80 119 53 115 49 104 79 100 120 104 85 72 103 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]
[11d 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Added g2C<32>J/<2F>pf<70><66><17><><13><>S<EFBFBD>&<26>*/<2F>/ <09>UU{F<> to the in memory item map, total items: 2
[11e 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11f 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[120 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[121 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[122 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 15 2a 79 95 dc 1a 4f 9f d9 f7 2b 8b e7 fa 76 |..*y...O...+...v|
00000010 7c 3b 45 4b 66 38 1e 63 53 69 6a b8 d4 cf 96 95 ||;EKf8.cSij.....|
[123 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 55 2b 79 c2 e3 52 39 d5 0d 3f |0E.!..U+y..R9..?|
00000010 32 94 72 08 04 4e 18 d5 3f 5f 07 41 4a 02 06 84 |2.r..N..?_.AJ...|
00000020 c6 96 b3 f6 9a 02 20 45 f6 90 1c 72 b9 2b b8 e1 |...... E...r.+..|
00000030 67 4c 25 52 60 65 6f b8 a8 97 45 6e 3b 15 5f 6b |gL%R`eo...En;._k|
00000040 bb 1f 9c 80 69 c6 55 |....i.U|
[124 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[125 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb ad aa 57 7e d9 16 37 b9 a0 5b |0E.!....W~..7..[|
00000010 dd bd 9e 0a 7f 4c 54 a9 c5 12 5c 12 b9 af 2c 8b |.....LT...\...,.|
00000020 55 7b 7d 62 20 02 20 48 1c ca 1b 86 b1 f2 79 4b |U{}b . H......yK|
00000030 ae 0a a1 7e ae 09 f6 f5 91 69 54 80 f5 9f c7 02 |...~.....iT.....|
00000040 dd a9 96 d9 38 ff 43 |....8.C|
[126 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----
MIICKDCCAc+gAwIBAgIRAL6UJxau6L+P+ZjjcRQ8/hAwCgYIKoZIzj0EAwIwczEL
MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkxMjI4MDA1MTAwWhcNMjkxMjI1MDA1MTAw
WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn
MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABIt57ZsKprUf
gQupDXqXcUNj/QolNEuRxscKeayhIlyjnmcQ/wA2ymmIlxXZjfkvNYq2LSz43Grd
VVFaNiJbFXujTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud
IwQkMCKAINMuFb3GQi3UqZWoThik9OYXCYkVHqKlZhEIVm/qe8jRMAoGCCqGSM49
BAMCA0cAMEQCIA1SKdLR6URj5OwCzKZhR4V/TOGLsL77sYN8KeuvY1GSAiBPsdGr
2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==
-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[127 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----
MIICKDCCAc+gAwIBAgIRAL6UJxau6L+P+ZjjcRQ8/hAwCgYIKoZIzj0EAwIwczEL
MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkxMjI4MDA1MTAwWhcNMjkxMjI1MDA1MTAw
WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn
MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABIt57ZsKprUf
gQupDXqXcUNj/QolNEuRxscKeayhIlyjnmcQ/wA2ymmIlxXZjfkvNYq2LSz43Grd
VVFaNiJbFXujTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud
IwQkMCKAINMuFb3GQi3UqZWoThik9OYXCYkVHqKlZhEIVm/qe8jRMAoGCCqGSM49
BAMCA0cAMEQCIA1SKdLR6URj5OwCzKZhR4V/TOGLsL77sYN8KeuvY1GSAiBPsdGr
2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==
-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[128 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:6
[129 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:6
[12a 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:5 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[12b 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12c 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12d 02-22 00:13:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12e 02-22 00:13:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:14443715817138774473 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[12f 02-22 00:13:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:14443715817138774473 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[130 02-22 00:13:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[131 02-22 00:13:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[132 02-22 00:13:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1098 bytes, Signature: 0 bytes
[133 02-22 00:13:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[134 02-22 00:13:41.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1098 bytes, Signature: 0 bytes
[135 02-22 00:13:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 fc a5 1f 21 7e 85 b2 56 1b d4 ea cd b4 04 f9 |C...!~..V.......|
00000010 3a 09 c9 0a de a2 47 da 74 b6 db c9 d2 49 75 f3 |:.....G.t....Iu.|
[136 02-22 00:13:41.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 3f 82 00 bd c9 82 fd 20 06 f0 |0E.!..?...... ..|
00000010 02 7e 8a 88 40 dc da 2b 45 05 cc e4 c3 89 9e f9 |.~..@..+E.......|
00000020 65 3e 97 2b 31 02 20 38 91 f0 38 a0 51 29 de 23 |e>.+1. 8..8.Q).#|
00000030 b1 1c fe 91 09 d7 41 5e b9 c2 22 f1 36 79 5e 3d |......A^..".6y^=|
00000040 7d 5f 7c a4 28 34 3e |}_|.(4>|
[137 02-22 00:13:41.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[138 02-22 00:13:41.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 db 57 64 8a dc 02 13 4d 7b 8e 2d |0D. D.Wd....M{.-|
00000010 a6 0e 62 b2 cd 8d c5 c5 14 60 f6 4d e1 6f a7 66 |..b......`.M.o.f|
00000020 76 1d ab 43 02 20 05 d1 b6 54 5c 90 3b f0 56 06 |v..C. ...T\.;.V.|
00000030 36 50 13 55 15 ed 48 60 0d 36 30 0b 19 70 84 8e |6P.U..H`.60..p..|
00000040 8e c5 89 ad f3 59 |.....Y|
[139 02-22 00:13:41.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[13a 02-22 00:13:41.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:14998660010994270356 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[13b 02-22 00:13:41.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:14998660010994270356 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[13c 02-22 00:13:41.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[13d 02-22 00:13:41.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A
[13e 02-22 00:13:41.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2AEF517739D75E4093E08898F84235F1ED8443427D34CE4586E17F7AFD2BF090
[13f 02-22 00:13:41.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[140 02-22 00:13:41.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[141 02-22 00:13:41.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413438745000 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers
[142 02-22 00:13:41.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Org1MSP-----BEGIN CERTIFICATE-----
MIICJzCCAc6gAwIBAgIQQIM2ou9DqfvkKtiUOZHklTAKBggqhkjOPQQDAjBzMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
b3JnMS5leGFtcGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBa
MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEI9vXO2dg2ogF
9G7NkteaJapySU671RiKcInNv3OAdIr+xsn11Wf7TM694Ow7/GWsGU71oZTZbHfw
i5SfKlabMqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
BCQwIoAg0y4VvcZCLdSplahOGKT05hcJiRUeoqVmEQhWb+p7yNEwCgYIKoZIzj0E
AwIDRwAwRAIgHtaqhr9/bxigCyhuKqYqDztw3uE11quIZ7drkaY/mvQCIGVtipl+
O8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ
-----END CERTIFICATE-----
Timestamp:inc_num:1582330413438745000 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 1094 bytes, Signature: 0 bytes
[143 02-22 00:13:41.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[144 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14998660010994270356 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 85 bytes, Signature: 0 bytes
[145 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14998660010994270356 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 85 bytes, Signature: 0 bytes
[146 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[147 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[148 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes
[149 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[14a 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:7
[14b 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:7
[14c 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:6 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[14d 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[14e 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[14f 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[150 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes
[151 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[152 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes to 1 peers
[153 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[154 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes
[155 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[156 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a ef 51 77 39 d7 5e 40 93 e0 88 98 f8 42 35 f1 |*.Qw9.^@.....B5.|
00000010 ed 84 43 42 7d 34 ce 45 86 e1 7f 7a fd 2b f0 90 |..CB}4.E...z.+..|
[157 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 32 a0 ec a9 fe aa d8 37 71 66 |0E.!..2......7qf|
00000010 76 47 57 12 25 d9 90 b1 a3 c7 80 1b 24 fa ac 54 |vGW.%.......$..T|
00000020 52 01 94 6b 06 02 20 58 6c eb 2a b3 09 ce 55 7f |R..k.. Xl.*...U.|
00000030 0b 23 44 01 dc 84 d1 a9 1c a4 90 2c 1c 3a 25 b3 |.#D........,.:%.|
00000040 89 b6 61 af 15 8b 19 |..a....|
[158 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[159 02-22 00:13:41.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 72 cc fc ed bd a7 91 a2 14 ad 02 |0D. ?r..........|
00000010 96 73 61 9c e6 c1 ae 6b f7 7b 59 f0 59 d1 c7 c1 |.sa....k.{Y.Y...|
00000020 ea 41 44 69 02 20 16 fc 93 7a 0f a4 77 8a 00 63 |.ADi. ...z..w..c|
00000030 16 c3 67 c8 d5 d9 11 ad bd f1 fc 12 d7 a9 b7 1b |..g.............|
00000040 37 8c a2 c1 38 52 |7...8R|
[15a 02-22 00:13:41.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Org1MSP-----BEGIN CERTIFICATE-----
MIICJzCCAc6gAwIBAgIQQIM2ou9DqfvkKtiUOZHklTAKBggqhkjOPQQDAjBzMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
b3JnMS5leGFtcGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBa
MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEI9vXO2dg2ogF
9G7NkteaJapySU671RiKcInNv3OAdIr+xsn11Wf7TM694Ow7/GWsGU71oZTZbHfw
i5SfKlabMqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
BCQwIoAg0y4VvcZCLdSplahOGKT05hcJiRUeoqVmEQhWb+p7yNEwCgYIKoZIzj0E
AwIDRwAwRAIgHtaqhr9/bxigCyhuKqYqDztw3uE11quIZ7drkaY/mvQCIGVtipl+
O8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ
-----END CERTIFICATE-----
Timestamp:inc_num:1582330413438745000 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[15b 02-22 00:13:41.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Org1MSP-----BEGIN CERTIFICATE-----
MIICJzCCAc6gAwIBAgIQQIM2ou9DqfvkKtiUOZHklTAKBggqhkjOPQQDAjBzMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
b3JnMS5leGFtcGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBa
MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx
LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEI9vXO2dg2ogF
9G7NkteaJapySU671RiKcInNv3OAdIr+xsn11Wf7TM694Ow7/GWsGU71oZTZbHfw
i5SfKlabMqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j
BCQwIoAg0y4VvcZCLdSplahOGKT05hcJiRUeoqVmEQhWb+p7yNEwCgYIKoZIzj0E
AwIDRwAwRAIgHtaqhr9/bxigCyhuKqYqDztw3uE11quIZ7drkaY/mvQCIGVtipl+
O8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ
-----END CERTIFICATE-----
Timestamp:inc_num:1582330413438745000 seq_num:7 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[15c 02-22 00:13:41.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15d 02-22 00:13:41.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15e 02-22 00:13:41.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15f 02-22 00:13:42.92 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:44756
[160 02-22 00:13:42.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[161 02-22 00:13:42.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[162 02-22 00:13:42.93 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[163 02-22 00:13:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[164 02-22 00:13:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel= txID=1b601119 mspID=Org1MSP
[165 02-22 00:13:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 c7 d5 60 7e 8e 5e 18 ca ce 7a 3a b4 79 49 f5 |H..`~.^...z:.yI.|
00000010 d6 5f 9e 42 31 6b 6f 75 2b 24 db e5 48 f8 ae 2b |._.B1kou+$..H..+|
[166 02-22 00:13:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 e2 84 c4 6c 4e ce c1 ee 96 67 04 |0D. 9...lN....g.|
00000010 33 87 10 f2 c0 f0 ea 57 b6 08 17 1a 9c f1 79 2b |3......W......y+|
00000020 4a e7 8b c4 02 20 07 c5 6b 99 a9 ca fa b5 bb f9 |J.... ..k.......|
00000030 bd 67 99 e7 ad 5a 06 e8 13 7c 38 e3 4b 28 a9 64 |.g...Z...|8.K(.d|
00000040 f0 33 ea c1 7b ab |.3..{.|
[167 02-22 00:13:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel= txID=1b601119 mspID=Org1MSP
[168 02-22 00:13:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU [1b601119] getting chaincode data for cscc on channel
[169 02-22 00:13:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[16a 02-22 00:13:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain
[16b 02-22 00:13:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos
[16c 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm
[16d 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure
[16e 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses
[16f 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium
[170 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[171 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos
[172 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs
[173 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[174 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[175 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[176 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[177 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[178 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are
[179 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP
[17a 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[17b 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[17c 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP
[17d 02-22 00:13:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[17e 02-22 00:13:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[17f 02-22 00:13:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[180 02-22 00:13:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[181 02-22 00:13:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[182 02-22 00:13:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are
[183 02-22 00:13:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP
[184 02-22 00:13:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[185 02-22 00:13:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[186 02-22 00:13:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP
[187 02-22 00:13:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[188 02-22 00:13:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos
[189 02-22 00:13:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType
[18a 02-22 00:13:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize
[18b 02-22 00:13:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout
[18c 02-22 00:13:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers
[18d 02-22 00:13:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions
[18e 02-22 00:13:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[18f 02-22 00:13:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos
[190 02-22 00:13:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints
[191 02-22 00:13:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[192 02-22 00:13:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[193 02-22 00:13:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg
[194 02-22 00:13:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[195 02-22 00:13:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[196 02-22 00:13:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP
[197 02-22 00:13:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICPjCCAeOgAwIBAgIQUu4O/3CefruTj+f4cPpoRTAKBggqhkjOPQQDAjBpMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
bGUuY29tMB4XDTE5MTIyODAwNTEwMFoXDTI5MTIyNTAwNTEwMFowaTELMAkGA1UE
BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABE/uMlLlw4IDRxdsdFL4HYis/uob
mR+KMPmI7UgekScAHdtCu8QNfc3ZckpPHL+cM6Hpq0cErdRcM3a3AHIgl5mjbTBr
MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgRfPbHeR9F+8Dnh3JA4jp//RddgsS
JfCRbYyrQeREkJkwCgYIKoZIzj0EAwIDSQAwRgIhAJ0ZlT8pflUizBRmqsDu6hZG
gdwvzGqJxyI5jfaeE3R3AiEAmigcSZT9QweaNF1TFfgTEng8OGKZ99fjfKhc4Afj
wBo=
-----END CERTIFICATE-----
[198 02-22 00:13:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICCzCCAbGgAwIBAgIRAJwXO+U7EeD61EDWbdg78cgwCgYIKoZIzj0EAwIwaTEL
MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt
cGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBaMFYxCzAJBgNV
BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp
c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG
SM49AwEHA0IABCblZpOXsfqkjJaXak9pDtbZOLMA0V9nbImyu0nA116RM5WpJeH4
kBw4kTOVfwDGlJ+K5X5guEbVYZl8IxhyVaSjTTBLMA4GA1UdDwEB/wQEAwIHgDAM
BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIEXz2x3kfRfvA54dyQOI6f/0XXYLEiXw
kW2Mq0HkRJCZMAoGCCqGSM49BAMCA0gAMEUCIQC6skiBvMjEAurpRg85+kD+mTSf
VNhNPWkz6ibPGJhsjwIgExujumcplJ4OfXxUwa2jiqVxlJSG+PoWBQn5skCT2+U=
-----END CERTIFICATE-----
[199 02-22 00:13:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[19a 02-22 00:13:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps)
[19b 02-22 00:13:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps
[19c 02-22 00:13:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V2_0 is supported and is enabled
[19d 02-22 00:13:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V2_0 is supported and is enabled
[19e 02-22 00:13:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP
[19f 02-22 00:13:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP
[1a0 02-22 00:13:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[1a1 02-22 00:13:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client
[1a2 02-22 00:13:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[1a3 02-22 00:13:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 c7 d5 60 7e 8e 5e 18 ca ce 7a 3a b4 79 49 f5 |H..`~.^...z:.yI.|
00000010 d6 5f 9e 42 31 6b 6f 75 2b 24 db e5 48 f8 ae 2b |._.B1kou+$..H..+|
[1a4 02-22 00:13:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 e2 84 c4 6c 4e ce c1 ee 96 67 04 |0D. 9...lN....g.|
00000010 33 87 10 f2 c0 f0 ea 57 b6 08 17 1a 9c f1 79 2b |3......W......y+|
00000020 4a e7 8b c4 02 20 07 c5 6b 99 a9 ca fa b5 bb f9 |J.... ..k.......|
00000030 bd 67 99 e7 ad 5a 06 e8 13 7c 38 e3 4b 28 a9 64 |.g...Z...|8.K(.d|
00000040 f0 33 ea c1 7b ab |.3..{.|
[1a5 02-22 00:13:42.98 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block
[1a6 02-22 00:13:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel
[1a7 02-22 00:13:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/]
[1a8 02-22 00:13:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist
[1a9 02-22 00:13:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists
[1aa 02-22 00:13:42.99 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage
[1ab 02-22 00:13:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files
[1ac 02-22 00:13:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix()
[1ad 02-22 00:13:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1
[1ae 02-22 00:13:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1
[1af 02-22 00:13:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found
[1b0 02-22 00:13:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0001ffce0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])
[1b1 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum]]
[1b2 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events
[1b3 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}]
[1b4 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] ineligible missing data entries to eligible
[1b5 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event
[1b6 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0]
[1b7 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}]
[1b8 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel:
[1b9 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = []
[1ba 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x7f}]
[1bb 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution []
[1bc 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty
[1bd 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false
[1be 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB()
[1bf 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty.
[1c0 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions
[1c1 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB
[1c2 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[1c3 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database
[1c4 02-22 00:13:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries
[1c5 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0]
[1c6 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[1c7 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[1c8 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[1c9 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0]
[1ca 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[1cb 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG
[1cc 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG]
[1cd 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.ConfigTxProcessor{}
[1ce 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[1cf 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = []
[1d0 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG
[1d1 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[1d2 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution []
[1d3 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]
[1d4 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"CHANNEL_CONFIG_ENV_BYTES"}:(*internal.keyOps)(0xc002a56280)}
[1d5 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[1d6 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[1d7 02-22 00:13:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[1d8 02-22 00:13:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0]
[1d9 02-22 00:13:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage
[1da 02-22 00:13:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store
[1db 02-22 00:13:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0]
[1dc 02-22 00:13:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0]
[1dd 02-22 00:13:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0]
[1de 02-22 00:13:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0}
[1df 02-22 00:13:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}]
[1e0 02-22 00:13:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished
[1e1 02-22 00:13:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0x3, 0x9f, 0xad, 0x95, 0x80, 0x43, 0x3, 0xa, 0x5a, 0x47, 0x98, 0xf4, 0x11, 0xca, 0xce, 0x1e, 0x24, 0x11, 0x52, 0x5d, 0x64, 0xaf, 0xd9, 0xe3, 0xf6, 0xf5, 0x4c, 0x23, 0x9c, 0x9e, 0x9, 0x98} txOffsets=
txId=d4d6e7777643a67d412e39b8ea8d0e403b4537b5226683c2e454a1ccdb736c3e locPointer=offset=39, bytesLength=26131
]
[1e2 02-22 00:13:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=26131] for tx ID: [d4d6e7777643a67d412e39b8ea8d0e403b4537b5226683c2e454a1ccdb736c3e] to txid-index
[1e3 02-22 00:13:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=26131] for tx number:[0] ID: [d4d6e7777643a67d412e39b8ea8d0e403b4537b5226683c2e454a1ccdb736c3e] to blockNumTranNum index
[1e4 02-22 00:13:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[26177], isChainEmpty=[false], lastBlockNumber=[0]
[1e5 02-22 00:13:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database
[1e6 02-22 00:13:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[1e7 02-22 00:13:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[1e8 02-22 00:13:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0]
[1e9 02-22 00:13:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}]
[1ea 02-22 00:13:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0]
[1eb 02-22 00:13:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[1ec 02-22 00:13:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[1ed 02-22 00:13:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dCHANNEL_CONFIG_ENV_BYTES] key(bytes)=[[]byte{0x64, 0x0, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x45, 0x4e, 0x56, 0x5f, 0x42, 0x59, 0x54, 0x45, 0x53}]
[1ee 02-22 00:13:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[1ef 02-22 00:13:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1]
[1f0 02-22 00:13:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[1f1 02-22 00:13:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database
[1f2 02-22 00:13:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions
[1f3 02-22 00:13:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction
[1f4 02-22 00:13:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}]
[1f5 02-22 00:13:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1]
[1f6 02-22 00:13:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0]
[1f7 02-22 00:13:43.05 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 42ms (state_validation=5ms block_and_pvtdata_commit=12ms state_commit=8ms) commitHash=[]
[1f8 02-22 00:13:43.06 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block
[1f9 02-22 00:13:43.06 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [e0352db9-107a-4f50-bcca-687317d3ddf3]
[1fa 02-22 00:13:43.06 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=CHANNEL_CONFIG_ENV_BYTES
[1fb 02-22 00:13:43.06 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e0352db9-107a-4f50-bcca-687317d3ddf3]
[1fc 02-22 00:13:43.06 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos
[1fd 02-22 00:13:43.06 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm
[1fe 02-22 00:13:43.06 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure
[1ff 02-22 00:13:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses
[200 02-22 00:13:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium
[201 02-22 00:13:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[202 02-22 00:13:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos
[203 02-22 00:13:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs
[204 02-22 00:13:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[205 02-22 00:13:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[206 02-22 00:13:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[207 02-22 00:13:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[208 02-22 00:13:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[209 02-22 00:13:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are
[20a 02-22 00:13:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP
[20b 02-22 00:13:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[20c 02-22 00:13:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[20d 02-22 00:13:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP
[20e 02-22 00:13:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[20f 02-22 00:13:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[210 02-22 00:13:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[211 02-22 00:13:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[212 02-22 00:13:43.10 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[213 02-22 00:13:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are
[214 02-22 00:13:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP
[215 02-22 00:13:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[216 02-22 00:13:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[217 02-22 00:13:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP
[218 02-22 00:13:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[219 02-22 00:13:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos
[21a 02-22 00:13:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType
[21b 02-22 00:13:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize
[21c 02-22 00:13:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout
[21d 02-22 00:13:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers
[21e 02-22 00:13:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions
[21f 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[220 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos
[221 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints
[222 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[223 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[224 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg
[225 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[226 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[227 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP
[228 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICPjCCAeOgAwIBAgIQUu4O/3CefruTj+f4cPpoRTAKBggqhkjOPQQDAjBpMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
bGUuY29tMB4XDTE5MTIyODAwNTEwMFoXDTI5MTIyNTAwNTEwMFowaTELMAkGA1UE
BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABE/uMlLlw4IDRxdsdFL4HYis/uob
mR+KMPmI7UgekScAHdtCu8QNfc3ZckpPHL+cM6Hpq0cErdRcM3a3AHIgl5mjbTBr
MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgRfPbHeR9F+8Dnh3JA4jp//RddgsS
JfCRbYyrQeREkJkwCgYIKoZIzj0EAwIDSQAwRgIhAJ0ZlT8pflUizBRmqsDu6hZG
gdwvzGqJxyI5jfaeE3R3AiEAmigcSZT9QweaNF1TFfgTEng8OGKZ99fjfKhc4Afj
wBo=
-----END CERTIFICATE-----
[229 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICCzCCAbGgAwIBAgIRAJwXO+U7EeD61EDWbdg78cgwCgYIKoZIzj0EAwIwaTEL
MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt
cGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBaMFYxCzAJBgNV
BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp
c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG
SM49AwEHA0IABCblZpOXsfqkjJaXak9pDtbZOLMA0V9nbImyu0nA116RM5WpJeH4
kBw4kTOVfwDGlJ+K5X5guEbVYZl8IxhyVaSjTTBLMA4GA1UdDwEB/wQEAwIHgDAM
BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIEXz2x3kfRfvA54dyQOI6f/0XXYLEiXw
kW2Mq0HkRJCZMAoGCCqGSM49BAMCA0gAMEUCIQC6skiBvMjEAurpRg85+kD+mTSf
VNhNPWkz6ibPGJhsjwIgExujumcplJ4OfXxUwa2jiqVxlJSG+PoWBQn5skCT2+U=
-----END CERTIFICATE-----
[22a 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[22b 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps)
[22c 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps
[22d 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP
[22e 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP
[22f 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP
[230 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP
[231 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP
[232 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP
[233 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP
[234 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP
[235 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application
[236 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application
[237 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application
[238 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application
[239 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application
[23a 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg
[23b 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg
[23c 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg
[23d 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer
[23e 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer
[23f 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer
[240 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer
[241 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel
[242 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel
[243 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel
[244 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[245 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[246 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP
[247 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP
[248 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers
[249 02-22 00:13:43.12 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins
[24a 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement
[24b 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers
[24c 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP
[24d 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP
[24e 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins
[24f 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement
[250 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers
[251 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers
[252 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs
[253 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities
[254 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement
[255 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement
[256 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers
[257 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers
[258 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins
[259 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer
[25a 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg
[25b 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/Endpoints
[25c 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP
[25d 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers
[25e 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins
[25f 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers
[260 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities
[261 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType
[262 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize
[263 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout
[264 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions
[265 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation
[266 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers
[267 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers
[268 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins
[269 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm
[26a 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure
[26b 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses
[26c 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities
[26d 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium
[26e 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins
[26f 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers
[270 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers
[271 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V2_0 is supported and is enabled
[272 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V2_0 is supported and is enabled
[273 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers'
[274 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers'
[275 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application]
[276 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[277 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[278 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path []
[279 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[27a 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[27b 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers'
[27c 02-22 00:13:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers'
[27d 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins'
[27e 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer]
[27f 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[280 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[281 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path []
[282 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg
[283 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation'
[284 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins'
[285 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers'
[286 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers'
[287 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing updates for orderer endpoints channel=businesschannel
[288 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Found orderer org 'OrdererOrg' has updates channel=businesschannel
[289 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> WARN Config defines both orderer org specific endpoints and global endpoints, global endpoints will be ignored channel=businesschannel
[28a 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Returning an orderer connection pool source with org specific endpoints only channel=businesschannel
[28b 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel
[28c 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel
[28d 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: []
[28e 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: []
[28f 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for channelID businesschannel
[290 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations
[291 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about
[292 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about
[293 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel
[294 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP]
[295 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP]
[296 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for channelID businesschannel
[297 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000
[298 02-22 00:13:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925
[299 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled
[29a 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1
[29b 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1
[29c 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408ACB284A6AEA4E4FA15...A46F2F28E676F87BD17DC3472A020801
[29d 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AC389B39BB588EE44798F61C53EFD04764E625FC5B3BD7C19FC18B34C15CF850
[29e 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel
[29f 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel
[2a0 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [3ef9f793-e5d7-4aa4-a99b-35bd718ce4bb]
[2a1 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> DEBU Returning []
[2a2 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3ef9f793-e5d7-4aa4-a99b-35bd718ce4bb]
[2a3 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6F121408ACB284A6AEA4E4FA15...0F0A0A5F6C6966656379636C65120131
[2a4 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3B81D9A7CDC13A8CEA3054E4FCC21E1558DC3A09CF3B68818F1611BEAAB21965
[2a5 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked
[2a6 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[2a7 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[2a8 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> DEBU [1b601119] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[2a9 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> DEBU [1b601119] notifying Txid:1b601119c24703e1dc2a1796fc8e67238bdc97cf60f16ab2aaafadcf4b2417d9, channelID:
[2aa 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[2ab 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: cscc duration: 213ms channel= txID=1b601119
[2ac 02-22 00:13:43.15 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44756 grpc.code=OK grpc.call_duration=235.9783ms
[2ad 02-22 00:13:43.16 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[2ae 02-22 00:13:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151008
[2af 02-22 00:13:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E657282DC372B05D55E91F7742ED62F7CBFDF94FA69C36FCE8B2BE43A86D6834
[2b0 02-22 00:13:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[2b1 02-22 00:13:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[2b2 02-22 00:13:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[2b3 02-22 00:13:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:8 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2b4 02-22 00:13:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b5 02-22 00:13:43.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[2b6 02-22 00:13:43.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2b7 02-22 00:13:43.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b8 02-22 00:13:43.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2b9 02-22 00:13:43.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2ba 02-22 00:13:43.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 0e 12 c3 b2 aa 6b 3b b7 8a 76 68 af 3d 3a c8 |^.....k;..vh.=:.|
00000010 b3 e1 de 6a fb 6e 73 b8 43 20 c6 9a 72 53 8b 89 |...j.ns.C ..rS..|
[2bb 02-22 00:13:43.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 70 4e d5 f1 55 f7 ce ad 22 69 |0E.!..pN..U..."i|
00000010 4e 33 db 57 f3 22 b8 11 35 9c a0 e0 29 01 57 c8 |N3.W."..5...).W.|
00000020 75 bb f5 73 1a 02 20 61 99 46 ac 7a 87 45 2b da |u..s.. a.F.z.E+.|
00000030 2a 24 b6 ee b3 fe 53 25 9a 84 7c c7 94 3c 93 a8 |*$....S%..|..<..|
00000040 da b3 78 a2 12 a9 3d |..x...=|
[2bc 02-22 00:13:43.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[2bd 02-22 00:13:43.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad 96 17 2b ea b0 f6 4d b0 e6 bd |0E.!....+...M...|
00000010 fb 31 ef dd 57 2d 26 33 94 c9 67 3a 56 9c 66 ce |.1..W-&3..g:V.f.|
00000020 a2 b1 96 7b 7a 02 20 41 70 56 02 cd 18 59 b2 1a |...{z. ApV...Y..|
00000030 aa e8 0b 2b 67 66 4c 0f a6 ed d8 80 36 76 9c 4d |...+gfL.....6v.M|
00000040 eb 54 80 ec aa 95 f2 |.T.....|
[2be 02-22 00:13:43.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2bf 02-22 00:13:43.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[2c0 02-22 00:13:43.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:8
[2c1 02-22 00:13:43.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:8
[2c2 02-22 00:13:43.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Org1MSP-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Timestamp:inc_num:1582330413427424700 seq_num:7 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[2c3 02-22 00:13:43.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c4 02-22 00:13:43.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c5 02-22 00:13:43.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c6 02-22 00:13:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting, peers found 0
[2c7 02-22 00:13:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[2c8 02-22 00:13:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[2c9 02-22 00:13:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[2ca 02-22 00:13:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...F6E9120C0884CDF3ABAEA4E4FA151001
[2cb 02-22 00:13:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1835445B8A819299B45AA00A4B460CE5C147282FEC16465E25B860E37416EB0B
[2cc 02-22 00:13:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[2cd 02-22 00:13:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:44764
[2ce 02-22 00:13:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel= txID=760eb0d8 mspID=Org1MSP
[2cf 02-22 00:13:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 38 78 07 6b 1f 08 14 32 8b 20 ba 3f c0 9a 7c |.8x.k...2. .?..||
00000010 0a bd bc 61 6e 43 ee 4d 01 d2 62 7a bd 9b 43 71 |...anC.M..bz..Cq|
[2d0 02-22 00:13:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 8c d9 4d 43 15 fd 96 33 9f ca |0E.!....MC...3..|
00000010 02 45 50 ee 02 da 9c 36 12 45 17 8e 4f be 7a c8 |.EP....6.E..O.z.|
00000020 a7 ab a8 67 1a 02 20 44 ba 9f d5 3b 68 c9 39 ff |...g.. D...;h.9.|
00000030 a6 e1 d6 ad 0b 8d 7a 12 b0 ac ea fd 17 94 8f 08 |......z.........|
00000040 1a c4 de c5 36 32 a0 |....62.|
[2d1 02-22 00:13:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel= txID=760eb0d8 mspID=Org1MSP
[2d2 02-22 00:13:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU [760eb0d8] getting chaincode data for cscc on channel
[2d3 02-22 00:13:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[2d4 02-22 00:13:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels
[2d5 02-22 00:13:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[2d6 02-22 00:13:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[2d7 02-22 00:13:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 38 78 07 6b 1f 08 14 32 8b 20 ba 3f c0 9a 7c |.8x.k...2. .?..||
00000010 0a bd bc 61 6e 43 ee 4d 01 d2 62 7a bd 9b 43 71 |...anC.M..bz..Cq|
[2d8 02-22 00:13:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 8c d9 4d 43 15 fd 96 33 9f ca |0E.!....MC...3..|
00000010 02 45 50 ee 02 da 9c 36 12 45 17 8e 4f be 7a c8 |.EP....6.E..O.z.|
00000020 a7 ab a8 67 1a 02 20 44 ba 9f d5 3b 68 c9 39 ff |...g.. D...;h.9.|
00000030 a6 e1 d6 ad 0b 8d 7a 12 b0 ac ea fd 17 94 8f 08 |......z.........|
00000040 1a c4 de c5 36 32 a0 |....62.|
[2d9 02-22 00:13:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU [760eb0d8] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[2da 02-22 00:13:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU [760eb0d8] notifying Txid:760eb0d8cf16590b830de335afdca3a79ad7e30c29a0ab92302ae31c0eb6b003, channelID:
[2db 02-22 00:13:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[2dc 02-22 00:13:44.77 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: cscc duration: 3ms channel= txID=760eb0d8
[2dd 02-22 00:13:44.77 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44764 grpc.code=OK grpc.call_duration=6.6198ms
[2de 02-22 00:13:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[2df 02-22 00:13:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:6698682710099857047 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2e0 02-22 00:13:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:6698682710099857047 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2e1 02-22 00:13:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[2e2 02-22 00:13:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e3 02-22 00:13:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[2e4 02-22 00:13:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e5 02-22 00:13:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[2e6 02-22 00:13:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2e7 02-22 00:13:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 ab 68 b1 e9 a8 10 ad 22 8c 85 df 99 a7 1d 11 |5.h.....".......|
00000010 2a c9 dd 1d 75 7d bd b9 8b e4 a2 4c c9 09 9f b0 |*...u}.....L....|
[2e8 02-22 00:13:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 e5 8a 08 61 39 78 aa d5 ce d0 |0E.!.....a9x....|
00000010 a7 84 86 b3 cc d5 b5 52 f3 cb 36 e3 e1 d5 53 18 |.......R..6...S.|
00000020 e0 b2 9f c5 db 02 20 4f fc 0b c3 ea c3 69 0b f6 |...... O.....i..|
00000030 45 26 fa 4d c7 ca f7 4d ca b3 ee 3f 8e 6a ff 28 |E&.M...M...?.j.(|
00000040 ab 11 f5 fe 73 5a ce |....sZ.|
[2e9 02-22 00:13:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[2ea 02-22 00:13:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 b5 97 43 84 52 35 ce 62 62 c4 62 |0D. 1..C.R5.bb.b|
00000010 bc e3 5b f7 1a e4 5a ea e8 47 fc 1b 30 45 5b 19 |..[...Z..G..0E[.|
00000020 3b fc 35 96 02 20 6a a9 d1 79 71 90 d9 5a 10 38 |;.5.. j..yq..Z.8|
00000030 d3 b2 23 f3 c4 26 ba ff ae 0f 36 b2 58 8f be 20 |..#..&....6.X.. |
00000040 89 be e3 e7 0a 4a |.....J|
[2eb 02-22 00:13:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2ec 02-22 00:13:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[2ed 02-22 00:13:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:9
[2ee 02-22 00:13:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:9
[2ef 02-22 00:13:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[2f0 02-22 00:13:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f1 02-22 00:13:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f2 02-22 00:13:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f3 02-22 00:13:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[2f4 02-22 00:13:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[2f5 02-22 00:13:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[2f6 02-22 00:13:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[2f7 02-22 00:13:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f8 02-22 00:13:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[2f9 02-22 00:13:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10326079660497694669 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[2fa 02-22 00:13:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10326079660497694669 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2fb 02-22 00:13:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2fc 02-22 00:13:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151009
[2fd 02-22 00:13:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 764A6975061636FCDBCDCE31918F26D4D66521569A327714D35E8A06478F5FD2
[2fe 02-22 00:13:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[2ff 02-22 00:13:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[300 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10326079660497694669 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 85 bytes, Signature: 0 bytes
[301 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10326079660497694669 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 85 bytes, Signature: 0 bytes
[302 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[303 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[304 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[305 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[306 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[307 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[308 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[309 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[30a 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 4a 69 75 06 16 36 fc db cd ce 31 91 8f 26 d4 |vJiu..6....1..&.|
00000010 d6 65 21 56 9a 32 77 14 d3 5e 8a 06 47 8f 5f d2 |.e!V.2w..^..G._.|
[30b 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 ee 75 54 8b 9a 97 97 83 be d4 a4 |0D. E.uT........|
00000010 71 96 50 ea ad 81 ec f0 ca ff cd 35 c0 61 79 1d |q.P........5.ay.|
00000020 dc 4f 07 ac 02 20 22 c2 d0 d1 1b 9d 57 55 26 0e |.O... ".....WU&.|
00000030 01 38 62 d8 e6 0f 23 52 83 91 ca 4e 21 bb 3b d8 |.8b...#R...N!.;.|
00000040 a4 52 e3 d8 ea e8 |.R....|
[30c 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[30d 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 f5 7c 2c f3 4a 51 97 ee 67 c6 |0E.!...|,.JQ..g.|
00000010 5f 1a a6 30 16 c9 a5 8f a0 ac 59 f0 95 f3 bf 5f |_..0......Y...._|
00000020 5e 18 12 80 7a 02 20 28 08 e3 7d f2 b4 22 dc ac |^...z. (..}.."..|
00000030 bc 5a 14 af 79 57 3d b3 f5 fb a0 86 f7 14 d9 58 |.Z..yW=........X|
00000040 e4 e9 de b7 3c ae 14 |....<..|
[30e 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[30f 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[310 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[311 02-22 00:13:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[312 02-22 00:13:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:44772
[313 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel= txID=9de3a84d mspID=Org1MSP
[314 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 10 13 49 62 fe cf d1 bd 41 c3 ca b3 3f 53 18 |...Ib....A...?S.|
00000010 7d f3 35 4a f9 fc 29 11 e8 5e ef 62 fd 68 a4 91 |}.5J..)..^.b.h..|
[315 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 5e 9a 2b 50 6d f8 f8 a2 7f f5 4c |0D. .^.+Pm.....L|
00000010 6c 10 22 bd 58 ce 98 25 51 67 15 55 a0 13 43 52 |l.".X..%Qg.U..CR|
00000020 c5 17 2d 80 02 20 29 3a 13 8b dc ff c5 bb a7 38 |..-.. ):.......8|
00000030 c0 4f 2c e9 3d 4f 4e bc 76 c7 6b b7 5d 6c ba 8b |.O,.=ON.v.k.]l..|
00000040 1c 96 bc 54 35 f9 |...T5.|
[316 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel= txID=9de3a84d mspID=Org1MSP
[317 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU [9de3a84d] getting chaincode data for qscc on channel
[318 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[319 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel
[31a 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo
[31b 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers)
[31c 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[31d 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[31e 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[31f 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[320 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[321 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 10 13 49 62 fe cf d1 bd 41 c3 ca b3 3f 53 18 |...Ib....A...?S.|
00000010 7d f3 35 4a f9 fc 29 11 e8 5e ef 62 fd 68 a4 91 |}.5J..)..^.b.h..|
[322 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 5e 9a 2b 50 6d f8 f8 a2 7f f5 4c |0D. .^.+Pm.....L|
00000010 6c 10 22 bd 58 ce 98 25 51 67 15 55 a0 13 43 52 |l.".X..%Qg.U..CR|
00000020 c5 17 2d 80 02 20 29 3a 13 8b dc ff c5 bb a7 38 |..-.. ):.......8|
00000030 c0 4f 2c e9 3d 4f 4e bc 76 c7 6b b7 5d 6c ba 8b |.O,.=ON.v.k.]l..|
00000040 1c 96 bc 54 35 f9 |...T5.|
[323 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[324 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d68d00 gate 1582330425698406000 evaluation starts
[325 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d68d00 signed by 0 principal evaluation starts (used [false])
[326 02-22 00:13:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d68d00 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[327 02-22 00:13:45.70 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[328 02-22 00:13:45.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[329 02-22 00:13:45.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[32a 02-22 00:13:45.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d68d00 principal evaluation succeeds for identity 0
[32b 02-22 00:13:45.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d68d00 gate 1582330425698406000 evaluation succeeds
[32c 02-22 00:13:45.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[32d 02-22 00:13:45.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[32e 02-22 00:13:45.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[32f 02-22 00:13:45.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[330 02-22 00:13:45.70 UTC] [%{longpkg}] %{callpath} -> DEBU [9de3a84d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[331 02-22 00:13:45.70 UTC] [%{longpkg}] %{callpath} -> DEBU [9de3a84d] notifying Txid:9de3a84de315d836bb5ccf64dd2c65ed3406d2bc534c6a294ca901e827947bdb, channelID:
[332 02-22 00:13:45.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[333 02-22 00:13:45.70 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: qscc duration: 13ms channel= txID=9de3a84d
[334 02-22 00:13:45.70 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44772 grpc.code=OK grpc.call_duration=16.7626ms
[335 02-22 00:13:45.70 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:44772: read: connection reset by peer
[336 02-22 00:13:45.70 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[337 02-22 00:13:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 1 peers
[338 02-22 00:13:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[339 02-22 00:13:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33a 02-22 00:13:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 215 bytes, Signature: 0 bytes
[33b 02-22 00:13:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 ac cc e4 55 76 fe 5e 8b 30 5e 9c 8c 88 f6 e5 |....Uv.^.0^.....|
00000010 a6 8a d9 60 e2 c5 e4 45 c5 18 37 de dc dc c2 34 |...`...E..7....4|
[33c 02-22 00:13:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 b6 9f 48 ca aa 33 6a 73 bc bd ad |0D. ...H..3js...|
00000010 47 68 bf 4d c4 be 09 9d 93 4b df 04 e7 71 f2 ef |Gh.M.....K...q..|
00000020 29 d1 87 10 02 20 5d ba 7a de c0 3a 8d 6e 13 8a |).... ].z..:.n..|
00000030 cc e2 6e 54 b6 24 37 83 a6 c5 29 8b 02 63 f4 d2 |..nT.$7...)..c..|
00000040 1f 9a cc 44 48 e8 |...DH.|
[33d 02-22 00:13:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[33e 02-22 00:13:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[33f 02-22 00:13:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[340 02-22 00:13:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[341 02-22 00:13:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[342 02-22 00:13:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[343 02-22 00:13:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICKDCCAc+gAwIBAgIRAL6UJxau6L+P+ZjjcRQ8/hAwCgYIKoZIzj0EAwIwczEL
MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkxMjI4MDA1MTAwWhcNMjkxMjI1MDA1MTAw
WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn
MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABIt57ZsKprUf
gQupDXqXcUNj/QolNEuRxscKeayhIlyjnmcQ/wA2ymmIlxXZjfkvNYq2LSz43Grd
VVFaNiJbFXujTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud
IwQkMCKAINMuFb3GQi3UqZWoThik9OYXCYkVHqKlZhEIVm/qe8jRMAoGCCqGSM49
BAMCA0cAMEQCIA1SKdLR6URj5OwCzKZhR4V/TOGLsL77sYN8KeuvY1GSAiBPsdGr
2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==
-----END CERTIFICATE-----
[344 02-22 00:13:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 ac cc e4 55 76 fe 5e 8b 30 5e 9c 8c 88 f6 e5 |....Uv.^.0^.....|
00000010 a6 8a d9 60 e2 c5 e4 45 c5 18 37 de dc dc c2 34 |...`...E..7....4|
[345 02-22 00:13:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 b6 9f 48 ca aa 33 6a 73 bc bd ad |0D. ...H..3js...|
00000010 47 68 bf 4d c4 be 09 9d 93 4b df 04 e7 71 f2 ef |Gh.M.....K...q..|
00000020 29 d1 87 10 02 20 5d ba 7a de c0 3a 8d 6e 13 8a |).... ].z..:.n..|
00000030 cc e2 6e 54 b6 24 37 83 a6 c5 29 8b 02 63 f4 d2 |..nT.$7...)..c..|
00000040 1f 9a cc 44 48 e8 |...DH.|
[346 02-22 00:13:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[347 02-22 00:13:47.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d870b0 gate 1582330427160651100 evaluation starts
[348 02-22 00:13:47.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d870b0 signed by 0 principal evaluation starts (used [false])
[34a 02-22 00:13:47.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d870b0 processing identity 0 - &{Org1MSP 8be655ba89451b517544b2a241617d188129889401e79f0659d7ccb414b44486}
[34b 02-22 00:13:47.16 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[349 02-22 00:13:47.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330423155849300 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:1 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 71 bytes to 1 peers
[34c 02-22 00:13:47.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330423155849300 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:1 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 71 bytes
[34d 02-22 00:13:47.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34e 02-22 00:13:47.16 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[34f 02-22 00:13:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[350 02-22 00:13:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d870b0 principal evaluation succeeds for identity 0
[351 02-22 00:13:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d870b0 gate 1582330427160651100 evaluation succeeds
[352 02-22 00:13:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[353 02-22 00:13:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[354 02-22 00:13:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[355 02-22 00:13:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[356 02-22 00:13:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[357 02-22 00:13:47.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[358 02-22 00:13:47.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[359 02-22 00:13:47.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:384052840771016423 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[35a 02-22 00:13:47.72 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:384052840771016423 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[35b 02-22 00:13:47.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[35c 02-22 00:13:47.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330423722843500 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:1 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[35d 02-22 00:13:47.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 ac cc e4 55 76 fe 5e 8b 30 5e 9c 8c 88 f6 e5 |....Uv.^.0^.....|
00000010 a6 8a d9 60 e2 c5 e4 45 c5 18 37 de dc dc c2 34 |...`...E..7....4|
[35e 02-22 00:13:47.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 b6 9f 48 ca aa 33 6a 73 bc bd ad |0D. ...H..3js...|
00000010 47 68 bf 4d c4 be 09 9d 93 4b df 04 e7 71 f2 ef |Gh.M.....K...q..|
00000020 29 d1 87 10 02 20 5d ba 7a de c0 3a 8d 6e 13 8a |).... ].z..:.n..|
00000030 cc e2 6e 54 b6 24 37 83 a6 c5 29 8b 02 63 f4 d2 |..nT.$7...)..c..|
00000040 1f 9a cc 44 48 e8 |...DH.|
[35f 02-22 00:13:47.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[360 02-22 00:13:48.14 UTC] [%{longpkg}] %{callpath} -> INFO [[businesschannel] Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]]
[361 02-22 00:13:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15100A
[362 02-22 00:13:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7B2ABD171ADC8837ABF53AF2610D9921F9E5D91178CF8C4F1F61410E77789E85
[363 02-22 00:13:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[364 02-22 00:13:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[365 02-22 00:13:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[366 02-22 00:13:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[367 02-22 00:13:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[368 02-22 00:13:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[369 02-22 00:13:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:53986 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[36a 02-22 00:13:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36b 02-22 00:13:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[36c 02-22 00:13:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[36d 02-22 00:13:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 24 79 ed aa 02 0b 26 33 c5 92 3f fb 59 69 c2 |.$y....&3..?.Yi.|
00000010 83 62 98 ce 39 d1 42 ab 30 7a a6 fb e7 cc 23 1f |.b..9.B.0z....#.|
[36e 02-22 00:13:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 a4 86 54 d9 16 fc e6 fa 17 29 |0E.!....T......)|
00000010 df 84 7f f8 f4 c4 4f c1 a2 10 59 b2 c5 ff c7 13 |......O...Y.....|
00000020 4e c6 35 2e 96 02 20 32 e9 e7 7f 40 66 82 a9 c9 |N.5... 2...@f...|
00000030 12 7f 85 07 d3 38 e0 a5 a4 66 ac 64 b7 94 62 91 |.....8...f.d..b.|
00000040 c3 43 55 e0 6b a4 05 |.CU.k..|
[36f 02-22 00:13:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[370 02-22 00:13:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe 94 2f 94 ed df 29 c6 e0 74 d3 |0E.!.../...)..t.|
00000010 87 a3 80 dc 7b ca cd 47 e1 49 06 69 d0 29 90 43 |....{..G.I.i.).C|
00000020 e1 8c 52 ac 25 02 20 37 6d bb c6 a5 39 c7 31 6a |..R.%. 7m...9.1j|
00000030 9d d3 6b 6c d8 3e ae 47 62 86 e5 80 3b 7a 0b 0e |..kl.>.Gb...;z..|
00000040 89 48 d4 55 7f c5 99 |.H.U...|
[371 02-22 00:13:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[372 02-22 00:13:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[373 02-22 00:13:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:10
[374 02-22 00:13:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:10
[375 02-22 00:13:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[376 02-22 00:13:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[377 02-22 00:13:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[378 02-22 00:13:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[379 02-22 00:13:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[37a 02-22 00:13:49.16 UTC] [%{longpkg}] %{callpath} -> INFO c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Becoming a leader
[37b 02-22 00:13:49.16 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel
[37c 02-22 00:13:49.16 UTC] [%{longpkg}] %{callpath} -> INFO This peer will retrieve blocks from ordering service and disseminate to other peers in the organization for channel businesschannel
[37d 02-22 00:13:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[37e 02-22 00:13:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[37f 02-22 00:13:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510021801
[380 02-22 00:13:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A7B50C12656155F3D78063966AD9DEA9262597F260C3373D50871FCD515AEEE6
[381 02-22 00:13:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[382 02-22 00:13:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0AEF060A1B08051A0608BDE4C1F20522...01120D1A0B08FFFFFFFFFFFFFFFFFF01
[383 02-22 00:13:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 57B164BA4B2DD18A401D7E1B525EA2825108EF25DD621E9392DB1E4E42405E5F
[384 02-22 00:13:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: ""
[385 02-22 00:13:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme
[386 02-22 00:13:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending update to cc: {[{orderer0.example.com:7050 0 <nil>}] <nil>}
[387 02-22 00:13:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first"
[388 02-22 00:13:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002dd6450, CONNECTING
[389 02-22 00:13:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[38b 02-22 00:13:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002dd6450, READY
[38a 02-22 00:13:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[38c 02-22 00:13:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[38d 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[38e 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[38f 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[390 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[391 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[392 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[393 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[394 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 d2 36 02 22 4f 8c 51 6a 2f 01 57 30 ea 6c c9 |R.6."O.Qj/.W0.l.|
00000010 6b 97 ba 22 26 24 17 93 56 19 72 cd 42 a9 b0 99 |k.."&$..V.r.B...|
[395 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f a6 c8 c7 29 1f 04 c6 d3 09 19 db |0D. ....).......|
00000010 e5 8c 8e e7 20 47 6d 4a 4d b8 25 60 db 38 c2 0c |.... GmJM.%`.8..|
00000020 5e 0b 40 92 02 20 59 2b 19 10 82 f7 59 fb a9 6f |^.@.. Y+....Y..o|
00000030 bf c3 4e 04 73 9b d5 92 29 05 57 f9 92 9d 2d aa |..N.s...).W...-.|
00000040 64 57 95 47 94 e9 |dW.G..|
[396 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[397 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd7270 gate 1582330429198649100 evaluation starts
[398 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd7270 signed by 0 principal evaluation starts (used [false])
[399 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd7270 processing identity 0 - &{OrdererMSP 9de2412befbda85787d990eb15cf69142545cfd8abf27ca5a151a46e885ec6cd}
[39a 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP
[39b 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[39c 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd7270 principal evaluation succeeds for identity 0
[39d 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd7270 gate 1582330429198649100 evaluation succeeds
[39e 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[39f 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[3a0 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[3a1 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[3a2 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [1] channel=businesschannel
[3a3 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1]
[3a4 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks
[3a5 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [1] channel=businesschannel
[3a6 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25928 bytes, seq: 1}, Envelope: 25961 bytes, Signature: 0 bytes to the block puller
[3a7 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1
[3a8 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1]
[3a9 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger
[3aa 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer
[3ab 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1]
[3ac 02-22 00:13:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1]
[3ad 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[3ae 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00295d880 env 0xc002df13b0 txn 0
[3af 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002df13b0
[3b0 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\272\344\301\362\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\njaA=\n-----END CERTIFICATE-----\n\022\030a\221^r\337!\360\003r\026\216\275\220\022D\376\352\304\265\0358H\256\377"
[3b1 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1
[3b2 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[3b3 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[3b4 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 9de2412befbda85787d990eb15cf69142545cfd8abf27ca5a151a46e885ec6cd}
[3b5 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[3b6 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[3b7 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 f2 7d 07 a8 d2 68 ee 92 11 d7 cf 55 a6 1d 43 |'.}...h.....U..C|
00000010 73 0d e0 3d 86 48 65 57 6f a5 2d f6 20 88 7d c8 |s..=.HeWo.-. .}.|
[3b8 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 0c 01 8d da da 8c a7 d5 16 fa 34 |0D. J..........4|
00000010 e1 2e 37 b5 3a 26 0e 90 10 ba 00 af 7e bb 28 74 |..7.:&......~.(t|
00000020 f4 74 57 67 02 20 1b d5 a2 43 29 d4 78 31 cb 62 |.tWg. ...C).x1.b|
00000030 69 22 0e 2c 93 bb ad 88 1f fe 72 d5 93 89 42 61 |i".,......r...Ba|
00000040 55 69 72 ae bf 1b |Uir...|
[3b9 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[3ba 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc002e90000, header channel_header:"\010\001\032\006\010\272\344\301\362\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\njaA=\n-----END CERTIFICATE-----\n\022\030a\221^r\337!\360\003r\026\216\275\220\022D\376\352\304\265\0358H\256\377"
[3bb 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[3bc 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[3bd 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[3be 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP
[3bf 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP
[3c0 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement
[3c1 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers
[3c2 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers
[3c3 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins
[3c4 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[3c5 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[3c6 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP
[3c7 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers
[3c8 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP
[3c9 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement
[3ca 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers
[3cb 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers
[3cc 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins
[3cd 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers
[3ce 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3cf 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[3d0 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[3d2 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3d3 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[3d4 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 c6 ad 19 14 08 f5 dd 40 96 c5 25 9e ac b3 3f |........@..%...?|
00000010 ad b4 cc 80 60 38 da c1 4f d1 1d 57 8b 29 73 25 |....`8..O..W.)s%|
[3d5 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 dd 96 88 87 e3 4f 64 ed 22 f6 |0E.!.......Od.".|
00000010 6b 7f 46 96 e6 df 18 25 27 60 c7 d5 55 6e 14 e6 |k.F....%'`..Un..|
00000020 43 b5 14 e6 4b 02 20 68 08 9a c8 2c de b8 de 4c |C...K. h...,...L|
00000030 58 45 c5 0a 1b 16 99 80 8c 9e 57 76 8e 79 9e 2b |XE........Wv.y.+|
00000040 d2 73 f4 34 70 94 d7 |.s.4p..|
[3d6 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3d7 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a0c0 gate 1582330429209632500 evaluation starts
[3d8 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a0c0 signed by 0 principal evaluation starts (used [false])
[3d9 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a0c0 processing identity 0 - &{OrdererMSP 9de2412befbda85787d990eb15cf69142545cfd8abf27ca5a151a46e885ec6cd}
[3da 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a0c0 principal evaluation succeeds for identity 0
[3db 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a0c0 gate 1582330429209632500 evaluation succeeds
[3dc 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[3dd 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[3de 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[3df 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[3e0 02-22 00:13:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [2] channel=businesschannel
[3e1 02-22 00:13:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2]
[3e2 02-22 00:13:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks
[3e3 02-22 00:13:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [2] channel=businesschannel
[3e4 02-22 00:13:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25988 bytes, seq: 2}, Envelope: 26021 bytes, Signature: 0 bytes to the block puller
[3e5 02-22 00:13:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2
[3d1 02-22 00:13:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25928 bytes, seq: 1}, Envelope: 25961 bytes, Signature: 0 bytes to 1 peers
[3e6 02-22 00:13:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25928 bytes, seq: 1}, Envelope: 25961 bytes, Signature: 0 bytes
[3e7 02-22 00:13:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e8 02-22 00:13:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP
[3ea 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins
[3eb 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application]
[3e9 02-22 00:13:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25988 bytes, seq: 2}, Envelope: 26021 bytes, Signature: 0 bytes to 1 peers
[3ec 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[3ee 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[3ef 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path []
[3f0 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[3f1 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[3f2 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP]
[3f3 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[3f4 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[3f5 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path []
[3f6 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==
[3f7 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b d1 4e b9 ae ec 8c 73 61 7e 99 69 d2 47 f9 53 |K.N....sa~.i.G.S|
00000010 2d 19 32 72 dd 30 27 32 29 75 be 91 5c c6 e0 d1 |-.2r.0'2)u..\...|
[3f8 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 34 23 61 30 9e 6c 3e 36 91 dd |0E.!..4#a0.l>6..|
00000010 9f c8 61 09 52 2d 2e f6 3b 54 20 06 6a 78 e4 72 |..a.R-..;T .jx.r|
00000020 5a 27 80 7d d1 02 20 45 f2 e2 dd 7e c4 3b 4e 44 |Z'.}.. E...~.;ND|
00000030 ca 4f 9f fe b3 e9 71 85 eb 4d c5 86 74 09 be 1b |.O....q..M..t...|
00000040 2a d1 ae a7 17 68 d3 |*....h.|
[3f9 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3fa 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0b960 gate 1582330429232464400 evaluation starts
[3fb 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0b960 signed by 0 principal evaluation starts (used [false])
[3fc 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0b960 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[3fd 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP
[3fe 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP
[3ff 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[400 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client
[401 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[402 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0b960 principal evaluation succeeds for identity 0
[403 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0b960 gate 1582330429232464400 evaluation succeeds
[404 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins
[405 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins
[406 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org2MSP\020\001" > mod_policy:"Admins"
[407 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins"
[408 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins"
[409 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins"
[40a 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to
[40b 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to
[40c 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to
[40d 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to
[40e 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins"
[40f 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[410 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins"
[411 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins"
[412 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins"
[413 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins"
[414 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins"
[415 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins"
[416 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins"
[417 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[418 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins"
[419 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[41a 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins"
[41b 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins"
[41c 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[41d 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos
[41e 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm
[41f 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure
[420 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses
[421 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium
[422 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[423 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos
[424 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType
[425 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize
[426 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout
[427 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers
[428 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions
[429 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[42a 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos
[42b 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints
[42c 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[42d 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[42e 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg
[42f 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[430 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[431 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP
[432 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[433 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
[434 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[3ed 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25988 bytes, seq: 2}, Envelope: 26021 bytes, Signature: 0 bytes
[435 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[436 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos
[437 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs
[438 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[439 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[43a 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[43b 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[43c 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[43d 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are
[43e 02-22 00:13:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP
[43f 02-22 00:13:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[440 02-22 00:13:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[441 02-22 00:13:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP
[442 02-22 00:13:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[443 02-22 00:13:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[444 02-22 00:13:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[445 02-22 00:13:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[446 02-22 00:13:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[447 02-22 00:13:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers:<host:"peer0.org1.example.com" port:7051 >
[448 02-22 00:13:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP
[449 02-22 00:13:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[44a 02-22 00:13:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[44b 02-22 00:13:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP
[44c 02-22 00:13:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[44d 02-22 00:13:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps)
[44e 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps
[44f 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg
[450 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg
[451 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg
[452 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer
[453 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer
[454 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer
[455 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer
[456 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP
[457 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP
[458 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP
[459 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP
[45a 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP
[45b 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP
[45c 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP
[45d 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP
[45e 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application
[45f 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application
[460 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application
[461 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application
[462 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application
[463 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel
[464 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel
[465 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel
[466 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[467 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[468 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP
[469 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP
[46a 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers
[46b 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers
[46c 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers
[46d 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins
[46e 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement
[46f 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP
[470 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP
[471 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins
[472 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement
[473 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers
[474 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers
[475 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities
[476 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs
[477 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement
[478 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement
[479 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers
[47a 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers
[47b 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins
[47c 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer
[47d 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg
[47e 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/Endpoints
[47f 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP
[480 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers
[481 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins
[482 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers
[483 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType
[484 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize
[485 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout
[486 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions
[487 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities
[488 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers
[489 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins
[48a 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation
[48b 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers
[48c 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities
[48d 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium
[48e 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm
[48f 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure
[490 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses
[491 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers
[492 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers
[493 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins
[494 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers'
[495 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers'
[496 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application]
[497 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[498 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[499 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path []
[49a 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[49b 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[49c 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers'
[49d 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers'
[49e 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins'
[49f 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer]
[4a0 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[4a1 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[4a2 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path []
[4a3 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg
[4a4 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation'
[4a5 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins'
[4a6 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers'
[4a7 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers'
[4a8 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V2_0 is supported and is enabled
[4a9 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V2_0 is supported and is enabled
[4aa 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Processing updates for orderer endpoints channel=businesschannel
[4ab 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> WARN Config defines both orderer org specific endpoints and global endpoints, global endpoints will be ignored channel=businesschannel
[4ac 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU No orderer endpoint addresses or TLS certs were changed channel=businesschannel
[4ad 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel
[4ae 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel
[4af 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: []
[4b0 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]
[4b1 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for channelID businesschannel
[4b2 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4b3 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4b4 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4b5 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4b6 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4b7 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 ac cc e4 55 76 fe 5e 8b 30 5e 9c 8c 88 f6 e5 |....Uv.^.0^.....|
00000010 a6 8a d9 60 e2 c5 e4 45 c5 18 37 de dc dc c2 34 |...`...E..7....4|
[4b8 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 b6 9f 48 ca aa 33 6a 73 bc bd ad |0D. ...H..3js...|
00000010 47 68 bf 4d c4 be 09 9d 93 4b df 04 e7 71 f2 ef |Gh.M.....K...q..|
00000020 29 d1 87 10 02 20 5d ba 7a de c0 3a 8d 6e 13 8a |).... ].z..:.n..|
00000030 cc e2 6e 54 b6 24 37 83 a6 c5 29 8b 02 63 f4 d2 |..nT.$7...)..c..|
00000040 1f 9a cc 44 48 e8 |...DH.|
[4b9 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4ba 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00305fcc0 gate 1582330429255235400 evaluation starts
[4bb 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00305fcc0 signed by 0 principal evaluation starts (used [false])
[4bc 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00305fcc0 processing identity 0 - &{Org1MSP 8be655ba89451b517544b2a241617d188129889401e79f0659d7ccb414b44486}
[4bd 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00305fcc0 principal evaluation succeeds for identity 0
[4be 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00305fcc0 gate 1582330429255235400 evaluation succeeds
[4bf 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[4c0 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4c1 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4c2 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4c3 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations
[4c4 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about
[4c5 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]
[4c6 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself
[4c7 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel
[4c8 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP]
[4c9 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP]
[4ca 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel
[4cb 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00295d880 env 0xc002df13b0 txn 0
[4cc 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[4cd 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 56ms
[4ce 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> WARN Invalid transaction type: header type is not an endorser transaction
[4cf 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 0 private write sets from cache. channel=businesschannel
[4d0 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from transient store channel=businesschannel
[4d1 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [1] channel=businesschannel
[4d2 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1]
[4d3 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[4d4 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[4d5 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[4d6 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1]
[4d7 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[4d8 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG
[4d9 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG]
[4da 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.ConfigTxProcessor{}
[4db 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[4dc 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = []
[4dd 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG
[4de 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[4df 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution []
[4e0 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]
[4e1 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"CHANNEL_CONFIG_ENV_BYTES"}:(*internal.keyOps)(0xc002fed900)}
[4e2 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[4e3 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[4e4 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[4e5 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1]
[4e6 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage
[4e7 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store
[4e8 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1]
[4e9 02-22 00:13:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1]
[4ea 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0xc8, 0x63, 0xe5, 0x5c, 0x3a, 0x3b, 0xfc, 0x9a, 0xa1, 0x9b, 0x13, 0x12, 0xc9, 0x3c, 0x9e, 0x36, 0xc6, 0xd, 0xb9, 0x94, 0xe1, 0xd, 0xef, 0x32, 0x58, 0x48, 0xff, 0xe8, 0x42, 0x52, 0xf6, 0x55} txOffsets=
txId=34d1ec9a30030d0f19cdac7df25ae8f14dd281af00b7618fbd216023650388af locPointer=offset=71, bytesLength=24918
]
[4eb 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=26248, bytesLength=24918] for tx ID: [34d1ec9a30030d0f19cdac7df25ae8f14dd281af00b7618fbd216023650388af] to txid-index
[4ec 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=26248, bytesLength=24918] for tx number:[0] ID: [34d1ec9a30030d0f19cdac7df25ae8f14dd281af00b7618fbd216023650388af] to blockNumTranNum index
[4ed 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[52127], isChainEmpty=[false], lastBlockNumber=[1]
[4ee 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database
[4ef 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[4f0 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[4f1 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[4f2 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[4f3 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dCHANNEL_CONFIG_ENV_BYTES] key(bytes)=[[]byte{0x64, 0x0, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x45, 0x4e, 0x56, 0x5f, 0x42, 0x59, 0x54, 0x45, 0x53}]
[4f4 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[4f5 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2]
[4f6 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}]
[4f7 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2]
[4f8 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[4f9 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database
[4fa 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions
[4fb 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction
[4fc 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1]
[4fd 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 9ms (state_validation=0ms block_and_pvtdata_commit=5ms state_commit=1ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]
[4fe 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6F121408ACB284A6AEA4E4FA15...0F0A0A5F6C6966656379636C65120131
[4ff 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6E1377DFBB9B6B0EB9B73068F709940660B0868042E854BBDB159F61C06C7CC8
[500 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s)
[501 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger
[502 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer
[503 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2]
[504 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2]
[505 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[506 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002ea8880 env 0xc002eacc30 txn 0
[507 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002eacc30
[508 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\274\344\301\362\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\njaA=\n-----END CERTIFICATE-----\n\022\030U~\023\313\374\273\031\247\033h\206B\210\233k\374Z2\362\3107!y\014"
[509 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1
[50a 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[50b 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[50c 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50d 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[50e 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 9de2412befbda85787d990eb15cf69142545cfd8abf27ca5a151a46e885ec6cd}
[50f 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[510 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[511 02-22 00:13:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 14 aa 7c 46 28 3c 66 ae 61 b6 ee 54 f8 b0 ba |...|F(<f.a..T...|
00000010 c5 c6 d5 ba a8 d6 c8 6b 68 a0 83 59 d3 c3 29 91 |.......kh..Y..).|
[512 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 64 3e b8 93 36 77 fa aa 7a 99 |0E.!..d>..6w..z.|
00000010 0a 83 2d e0 8c d1 1d 25 8a 3d 85 a3 12 56 63 5e |..-....%.=...Vc^|
00000020 ab f9 80 17 20 02 20 3d 23 1f ce 2f 28 de 23 26 |.... . =#../(.#&|
00000030 6e 52 5d 16 5f 3e 1a 3a 6d ed a9 69 e0 81 c0 f8 |nR]._>.:m..i....|
00000040 d5 d2 c9 cd 22 24 c9 |...."$.|
[513 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[514 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc003120000, header channel_header:"\010\001\032\006\010\274\344\301\362\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\njaA=\n-----END CERTIFICATE-----\n\022\030U~\023\313\374\273\031\247\033h\206B\210\233k\374Z2\362\3107!y\014"
[515 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[516 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[517 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[518 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP
[519 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP
[51a 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers
[51b 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins
[51c 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement
[51d 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers
[51e 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[51f 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[520 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP
[521 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP
[522 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers
[523 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins
[524 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement
[525 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers
[526 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers
[527 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP
[528 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins
[529 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application]
[52a 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[52b 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[52c 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path []
[52d 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[52e 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[52f 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP]
[530 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[531 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[532 02-22 00:13:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path []
[533 02-22 00:13:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==
[534 02-22 00:13:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[535 02-22 00:13:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[536 02-22 00:13:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 18 97 04 d7 6d dd 79 86 ff df 2f 48 95 44 0c |.....m.y.../H.D.|
00000010 ed b7 00 ae ce e8 bc 78 3b e3 a1 60 36 11 97 8f |.......x;..`6...|
[537 02-22 00:13:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 52 59 1f e9 13 69 1a cc 0c 1f |0E.!..RY...i....|
00000010 26 83 0f cb 78 2b 63 9e 74 ef a3 6b ca 71 cb db |&...x+c.t..k.q..|
00000020 25 60 86 bd 04 02 20 2c 10 e9 a8 00 99 bb 39 be |%`.... ,......9.|
00000030 9f 91 f7 b3 34 ba 47 65 47 45 ab cf 0e 72 f6 d8 |....4.GeGE...r..|
00000040 81 b8 5c 81 6c 01 2e |..\.l..|
[538 02-22 00:13:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[539 02-22 00:13:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003152db0 gate 1582330429282532300 evaluation starts
[53a 02-22 00:13:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003152db0 signed by 0 principal evaluation starts (used [false])
[53b 02-22 00:13:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003152db0 processing identity 0 - &{Org2MSP 44c87d6d29f5a901134fda071a7edf7126a7788becd3944cea03a9d24174d773}
[53c 02-22 00:13:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP
[53d 02-22 00:13:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP
[53e 02-22 00:13:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[53f 02-22 00:13:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[540 02-22 00:13:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client
[541 02-22 00:13:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[542 02-22 00:13:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003152db0 principal evaluation succeeds for identity 0
[543 02-22 00:13:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003152db0 gate 1582330429282532300 evaluation succeeds
[544 02-22 00:13:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins
[545 02-22 00:13:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins
[546 02-22 00:13:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers
[547 02-22 00:13:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins"
[548 02-22 00:13:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins"
[549 02-22 00:13:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins"
[54a 02-22 00:13:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins"
[54b 02-22 00:13:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[54c 02-22 00:13:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins"
[54d 02-22 00:13:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[54e 02-22 00:13:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins"
[54f 02-22 00:13:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org1MSP\020\001" > mod_policy:"Admins"
[550 02-22 00:13:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins"
[551 02-22 00:13:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins"
[552 02-22 00:13:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to
[553 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to
[554 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to
[555 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to
[556 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[557 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins"
[558 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins"
[559 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy:<type:3 value:"\n\013Endorsement\020\002" > mod_policy:"Admins"
[55a 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins"
[55b 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[55c 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins"
[55d 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins"
[55e 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos
[55f 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm
[560 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure
[561 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses
[562 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium
[563 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[564 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos
[565 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs
[566 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[567 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[568 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[569 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[56a 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[56b 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers:<host:"peer0.org1.example.com" port:7051 >
[56c 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP
[56d 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[56e 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[56f 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP
[570 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[571 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[572 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[573 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[574 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[575 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers:<host:"peer0.org2.example.com" port:7051 >
[576 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP
[577 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[578 02-22 00:13:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[579 02-22 00:13:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP
[57a 02-22 00:13:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICUTCCAfegAwIBAgIQZacO26pEEi7uRpxMqrT/NDAKBggqhkjOPQQDAjBzMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
b3JnMi5leGFtcGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBa
MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD
ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE
V3ISfdpJiQsD3lyTyf2qPntUF1rq7Y+XsMAe1KNz771i2jYrz/EsxNF4w8zXuE/b
6+xjJgUj/SEZ0dTpzRC8R6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG
CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBV
4NvNjFI29qDlGrBaOerjLlzOGL4FjLU9jq1sTeOXlTAKBggqhkjOPQQDAgNIADBF
AiBaOCByB93x9gnKUekOc59nK5sJBrm0F5Ju4FmZaEs28QIhAMlVxThPZpkKkSRW
FGc7n+YB0YmkroQBRyltH6EFZkw9
-----END CERTIFICATE-----
[57b 02-22 00:13:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos
[57c 02-22 00:13:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType
[57d 02-22 00:13:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize
[57e 02-22 00:13:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout
[57f 02-22 00:13:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers
[580 02-22 00:13:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions
[581 02-22 00:13:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[582 02-22 00:13:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos
[583 02-22 00:13:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints
[584 02-22 00:13:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[585 02-22 00:13:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[586 02-22 00:13:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg
[587 02-22 00:13:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[588 02-22 00:13:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[589 02-22 00:13:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP
[58a 02-22 00:13:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICPjCCAeOgAwIBAgIQUu4O/3CefruTj+f4cPpoRTAKBggqhkjOPQQDAjBpMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
bGUuY29tMB4XDTE5MTIyODAwNTEwMFoXDTI5MTIyNTAwNTEwMFowaTELMAkGA1UE
BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABE/uMlLlw4IDRxdsdFL4HYis/uob
mR+KMPmI7UgekScAHdtCu8QNfc3ZckpPHL+cM6Hpq0cErdRcM3a3AHIgl5mjbTBr
MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgRfPbHeR9F+8Dnh3JA4jp//RddgsS
JfCRbYyrQeREkJkwCgYIKoZIzj0EAwIDSQAwRgIhAJ0ZlT8pflUizBRmqsDu6hZG
gdwvzGqJxyI5jfaeE3R3AiEAmigcSZT9QweaNF1TFfgTEng8OGKZ99fjfKhc4Afj
wBo=
-----END CERTIFICATE-----
[58b 02-22 00:13:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
[58c 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[58d 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps)
[58e 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps
[58f 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP
[590 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP
[591 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP
[592 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP
[593 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP
[594 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP
[595 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP
[596 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP
[597 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application
[598 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application
[599 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application
[59a 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application
[59b 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application
[59c 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg
[59d 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg
[59e 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg
[59f 02-22 00:13:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer
[5a0 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer
[5a1 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer
[5a2 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer
[5a3 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel
[5a4 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel
[5a5 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel
[5a6 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[5a7 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[5a8 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP
[5a9 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP
[5aa 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers
[5ab 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement
[5ac 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers
[5ad 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers
[5ae 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins
[5af 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP
[5b0 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP
[5b1 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers
[5b2 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers
[5b3 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-02-22T00:13:51.339Z grpc.peer_address=172.18.0.6:54030 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=114.8µs
[5b4 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers
[5b5 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins
[5b6 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement
[5b7 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs
[5b8 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities
[5b9 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins
[5ba 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement
[5bb 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement
[5bc 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers
[5bd 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers
[5be 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer
[5bf 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg
[5c0 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/Endpoints
[5c1 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP
[5c2 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins
[5c3 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers
[5c4 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers
[5c5 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType
[5c6 02-22 00:13:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize
[5c7 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout
[5c8 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions
[5c9 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities
[5ca 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers
[5cb 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers
[5cc 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins
[5cd 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation
[5ce 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium
[5cf 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm
[5d0 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure
[5d1 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses
[5d2 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities
[5d3 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers
[5d4 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers
[5d5 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins
[5d6 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers'
[5d7 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers'
[5d8 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application]
[5d9 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[5da 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[5db 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path []
[5dc 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[5dd 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[5de 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers'
[5df 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers'
[5e0 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins'
[5e1 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer]
[5e2 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[5e3 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[5e4 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path []
[5e5 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg
[5e6 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation'
[5e7 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins'
[5e8 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers'
[5e9 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers'
[5ea 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V2_0 is supported and is enabled
[5eb 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V2_0 is supported and is enabled
[5ec 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Processing updates for orderer endpoints channel=businesschannel
[5ed 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> WARN Config defines both orderer org specific endpoints and global endpoints, global endpoints will be ignored channel=businesschannel
[5ee 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU No orderer endpoint addresses or TLS certs were changed channel=businesschannel
[5ef 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel
[5f0 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel
[5f1 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]
[5f2 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]
[5f3 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for channelID businesschannel
[5f4 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5f5 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5f6 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5f7 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5f8 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5f9 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fa 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[5fb 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[5fc 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[5fd 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:54030
[5fe 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"g2C\276J/\372pf\335\366\027\264\203\023\251\344S\337&\265*/\336/\t\264UU{F\310" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\335}\274\246u\3009v\251\rJG\302\340\263@\370\313\341?\326!3\350\023\320{\335\206\341V" from 172.18.0.6:54030
[5ff 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c 98 cf f0 20 c7 d9 fd b9 ce d3 17 55 85 70 70 |,... .......U.pp|
00000010 b3 08 3a 82 2a 57 3b dc 6d e0 0c aa 7c 99 d3 24 |..:.*W;.m...|..$|
[600 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 11 c7 51 14 4b 97 83 2c 28 82 |0E.!....Q.K..,(.|
00000010 54 b1 47 90 47 ad 98 e5 6b 16 b9 ed 20 e9 cf 0f |T.G.G...k... ...|
00000020 c2 e6 e5 c8 8a 02 20 4e 04 19 fe e6 43 af 6d 35 |...... N....C.m5|
00000030 dd 5c 41 c0 d7 80 94 20 ba 01 a4 15 5a 77 81 bb |.\A.... ....Zw..|
00000040 d1 b6 fc 61 c7 35 ff |...a.5.|
[601 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:54030
[602 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:54030
[603 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[604 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[605 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:53986 disconnected
[606 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:53986 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=15.4844879s
[607 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[608 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[609 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[60a 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:54030 disconnected
[60b 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-02-22T00:13:59.354Z grpc.peer_address=172.18.0.6:54030 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=3.1551ms
[60c 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 ac cc e4 55 76 fe 5e 8b 30 5e 9c 8c 88 f6 e5 |....Uv.^.0^.....|
00000010 a6 8a d9 60 e2 c5 e4 45 c5 18 37 de dc dc c2 34 |...`...E..7....4|
[60d 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 b6 9f 48 ca aa 33 6a 73 bc bd ad |0D. ...H..3js...|
00000010 47 68 bf 4d c4 be 09 9d 93 4b df 04 e7 71 f2 ef |Gh.M.....K...q..|
00000020 29 d1 87 10 02 20 5d ba 7a de c0 3a 8d 6e 13 8a |).... ].z..:.n..|
00000030 cc e2 6e 54 b6 24 37 83 a6 c5 29 8b 02 63 f4 d2 |..nT.$7...)..c..|
00000040 1f 9a cc 44 48 e8 |...DH.|
[60e 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[60f 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b1de0 gate 1582330429359210500 evaluation starts
[610 02-22 00:13:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b1de0 signed by 0 principal evaluation starts (used [false])
[611 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[612 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[613 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b1de0 processing identity 0 - &{Org1MSP 8be655ba89451b517544b2a241617d188129889401e79f0659d7ccb414b44486}
[614 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[615 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[616 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[617 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b1de0 principal evaluation succeeds for identity 0
[618 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b1de0 gate 1582330429359210500 evaluation succeeds
[619 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[61a 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[61b 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[61c 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[61d 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations
[61e 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]
[61f 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself
[620 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]
[621 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: <nil>, Metadata:
[622 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[623 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: ""
[624 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme
[625 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 <nil>}] <nil>}
[626 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first"
[627 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0033067c0, CONNECTING
[628 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel
[629 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP]
[62a 02-22 00:13:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP]
[62b 02-22 00:13:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel
[62c 02-22 00:13:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0033067c0, READY
[62d 02-22 00:13:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002ea8880 env 0xc002eacc30 txn 0
[62e 02-22 00:13:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[62f 02-22 00:13:49.37 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 109ms
[630 02-22 00:13:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[631 02-22 00:13:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[632 02-22 00:13:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051
[633 02-22 00:13:49.37 UTC] [%{longpkg}] %{callpath} -> WARN Invalid transaction type: header type is not an endorser transaction
[634 02-22 00:13:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 0 private write sets from cache. channel=businesschannel
[635 02-22 00:13:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from transient store channel=businesschannel
[636 02-22 00:13:49.37 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [2] channel=businesschannel
[637 02-22 00:13:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2]
[638 02-22 00:13:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[639 02-22 00:13:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[63a 02-22 00:13:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[63b 02-22 00:13:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2]
[63c 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[63d 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG
[63e 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG]
[63f 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.ConfigTxProcessor{}
[640 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[641 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = []
[642 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG
[643 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[644 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution []
[645 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]
[646 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"CHANNEL_CONFIG_ENV_BYTES"}:(*internal.keyOps)(0xc00326ebc0)}
[647 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[648 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[649 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[64a 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2]
[64b 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage
[64c 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store
[64d 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2]
[64e 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2]
[64f 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0x5, 0xc8, 0x7f, 0x3b, 0x8c, 0xdd, 0xc6, 0xad, 0x55, 0xf5, 0x31, 0x41, 0x4, 0x46, 0xa2, 0xbf, 0x73, 0xe4, 0x19, 0x14, 0x3d, 0x74, 0xb1, 0x14, 0x5b, 0xcd, 0xd9, 0x96, 0x2f, 0x1c, 0x3a, 0xd8} txOffsets=
txId=512d3308f9cd28e9477ac2d6366677affda30ef23a3b8a2412d5d64b97fb350c locPointer=offset=71, bytesLength=24977
]
[650 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=52198, bytesLength=24977] for tx ID: [512d3308f9cd28e9477ac2d6366677affda30ef23a3b8a2412d5d64b97fb350c] to txid-index
[651 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=52198, bytesLength=24977] for tx number:[0] ID: [512d3308f9cd28e9477ac2d6366677affda30ef23a3b8a2412d5d64b97fb350c] to blockNumTranNum index
[652 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[78137], isChainEmpty=[false], lastBlockNumber=[2]
[653 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database
[654 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[655 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[656 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[657 02-22 00:13:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[658 02-22 00:13:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dCHANNEL_CONFIG_ENV_BYTES] key(bytes)=[[]byte{0x64, 0x0, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x45, 0x4e, 0x56, 0x5f, 0x42, 0x59, 0x54, 0x45, 0x53}]
[659 02-22 00:13:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\033-\316\317\252\020\230HT\305\2621\227\207D\016\037\224g}\257l1\224\340\344\277`\030QN\t" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\n9c39/yCaZdGN1KZ4nkfCncYA4rR07vJKKu1pdw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\346\275\301Z\306\337\177\302R\177H\356D\361IO\206\353\326\3060\305\201(d\377J\277\214s\257\354" from 172.18.0.7:7051
[65a 02-22 00:13:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[65b 02-22 00:13:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[65c 02-22 00:13:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[65d 02-22 00:13:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[65e 02-22 00:13:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[65f 02-22 00:13:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[660 02-22 00:13:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[661 02-22 00:13:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[662 02-22 00:13:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[663 02-22 00:13:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[664 02-22 00:13:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[665 02-22 00:13:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[666 02-22 00:13:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[667 02-22 00:13:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[668 02-22 00:13:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[669 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[66a 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 55 c0 45 a2 0c 75 a8 2b 12 9b 9f 9f e2 bc 2d |.U.E..u.+......-|
00000010 c4 35 8a 2c c6 50 7a 01 37 e3 a3 c4 bf 81 b9 d2 |.5.,.Pz.7.......|
[66b 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 5d 26 19 f1 7a dc d6 fa 25 97 |0E.!..]&..z...%.|
00000010 fe b6 64 ba 96 1f 40 6a 9a 6c 09 18 89 8c 1d 29 |..d...@j.l.....)|
00000020 e4 9d 8a 3e f6 02 20 1d 83 df 39 90 cb d0 d0 d1 |...>.. ...9.....|
00000030 74 1f 5b 68 e4 8d 99 5e 9f 0b ed eb 2a 79 75 f6 |t.[h...^....*yu.|
00000040 8d 8a 07 f1 8f a9 7c |......||
[66c 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[66d 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393450 gate 1582330429452293500 evaluation starts
[66e 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393450 signed by 0 principal evaluation starts (used [false])
[66f 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393450 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[670 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[671 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393450 principal evaluation fails
[672 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393450 gate 1582330429452293500 evaluation fails
[673 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[674 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[675 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[676 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 55 c0 45 a2 0c 75 a8 2b 12 9b 9f 9f e2 bc 2d |.U.E..u.+......-|
00000010 c4 35 8a 2c c6 50 7a 01 37 e3 a3 c4 bf 81 b9 d2 |.5.,.Pz.7.......|
[677 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 5d 26 19 f1 7a dc d6 fa 25 97 |0E.!..]&..z...%.|
00000010 fe b6 64 ba 96 1f 40 6a 9a 6c 09 18 89 8c 1d 29 |..d...@j.l.....)|
00000020 e4 9d 8a 3e f6 02 20 1d 83 df 39 90 cb d0 d0 d1 |...>.. ...9.....|
00000030 74 1f 5b 68 e4 8d 99 5e 9f 0b ed eb 2a 79 75 f6 |t.[h...^....*yu.|
00000040 8d 8a 07 f1 8f a9 7c |......||
[678 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[67a 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393d70 gate 1582330429457343000 evaluation starts
[679 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[67b 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3]
[67c 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}]
[67d 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3]
[67f 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[67e 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393d70 signed by 0 principal evaluation starts (used [false])
[680 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database
[681 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions
[682 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction
[683 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393d70 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[684 02-22 00:13:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP
[685 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[686 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393d70 principal evaluation succeeds for identity 0
[687 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393d70 gate 1582330429457343000 evaluation succeeds
[688 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[689 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[68a 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[68b 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[68c 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2]
[68d 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 83ms (state_validation=2ms block_and_pvtdata_commit=7ms state_commit=69ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]
[68e 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6F121408ACB284A6AEA4E4FA15...0F0A0A5F6C6966656379636C65120131
[68f 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AC7FD1EEF834325A2C2FBEA804B15879C93B84A712C71348CAE573DCF315AB67
[690 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s)
[691 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051
[692 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[694 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151010
[695 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1A43F74ACD65CA1D285CAC9B511D2D68581D9593AC87C125B3FB6FD125ABCA88
[693 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[696 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[697 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[698 02-22 00:13:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[699 02-22 00:13:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 8033404387853133216, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes to 1 peers
[69a 02-22 00:13:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 8033404387853133216, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes
[69b 02-22 00:13:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[69c 02-22 00:13:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: ""
[69d 02-22 00:13:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme
[69e 02-22 00:13:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 <nil>}] <nil>}
[69f 02-22 00:13:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first"
[6a0 02-22 00:13:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003462950, CONNECTING
[6a1 02-22 00:13:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003462950, READY
[6a2 02-22 00:13:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[6a3 02-22 00:13:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[6a4 02-22 00:13:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:7051
[6a5 02-22 00:13:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\033-\316\317\252\020\230HT\305\2621\227\207D\016\037\224g}\257l1\224\340\344\277`\030QN\t" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAI5BTfE0ETqLjuTa7tX8rQIwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkxMjI4MDA1MTAwWhcNMjkxMjI1MDA1MTAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABJ+P1Nsaoy0d\nVEeyPeIrNCTqfnL6dGeshDvRX0Os6OBYMwrXkXRWg4YEmIwNXSL8cJwap+6afMfK\ncXUDe2tozNWjTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIFXg282MUjb2oOUasFo56uMuXM4YvgWMtT2OrWxN45eVMAoGCCqGSM49\nBAMCA0cAMEQCIDNaYLNeEYHf4nHOlgKoUFdzwN/m3kL67eHTnCx2SG3lAiBDx9YX\n9c39/yCaZdGN1KZ4nkfCncYA4rR07vJKKu1pdw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\346\275\301Z\306\337\177\302R\177H\356D\361IO\206\353\326\3060\305\201(d\377J\277\214s\257\354" from 172.18.0.7:7051
[6a6 02-22 00:13:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a7 02-22 00:13:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6a8 02-22 00:13:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a9 02-22 00:13:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6aa 02-22 00:13:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ab 02-22 00:13:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6ac 02-22 00:13:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6ad 02-22 00:13:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6ae 02-22 00:13:49.52 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-02-22T00:13:51.524Z grpc.peer_address=172.18.0.6:54038 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=108.3µs
[6af 02-22 00:13:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6b0 02-22 00:13:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6b1 02-22 00:13:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6b2 02-22 00:13:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 55 c0 45 a2 0c 75 a8 2b 12 9b 9f 9f e2 bc 2d |.U.E..u.+......-|
00000010 c4 35 8a 2c c6 50 7a 01 37 e3 a3 c4 bf 81 b9 d2 |.5.,.Pz.7.......|
[6b3 02-22 00:13:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 6d 65 9e db 58 bd 41 a9 68 07 |0E.!..me..X.A.h.|
00000010 62 33 07 f2 b8 3e 48 e1 45 6a 3e e2 b1 18 15 05 |b3...>H.Ej>.....|
00000020 f8 04 33 45 98 02 20 0d a8 92 af 84 f3 4a a0 09 |..3E.. ......J..|
00000030 f8 4a eb 2c 87 cb d4 80 a1 fb db 8f 9b 09 e8 ce |.J.,............|
00000040 80 d0 94 43 26 5f 75 |...C&_u|
[6b4 02-22 00:13:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6b5 02-22 00:13:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ce630 gate 1582330429535253600 evaluation starts
[6b6 02-22 00:13:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ce630 signed by 0 principal evaluation starts (used [false])
[6b7 02-22 00:13:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ce630 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6b9 02-22 00:13:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ce630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6ba 02-22 00:13:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ce630 principal evaluation fails
[6b8 02-22 00:13:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[6bb 02-22 00:13:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[6bc 02-22 00:13:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:54038
[6bd 02-22 00:13:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ce630 gate 1582330429535253600 evaluation fails
[6be 02-22 00:13:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6bf 02-22 00:13:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6c0 02-22 00:13:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6c1 02-22 00:13:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 55 c0 45 a2 0c 75 a8 2b 12 9b 9f 9f e2 bc 2d |.U.E..u.+......-|
00000010 c4 35 8a 2c c6 50 7a 01 37 e3 a3 c4 bf 81 b9 d2 |.5.,.Pz.7.......|
[6c2 02-22 00:13:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 6d 65 9e db 58 bd 41 a9 68 07 |0E.!..me..X.A.h.|
00000010 62 33 07 f2 b8 3e 48 e1 45 6a 3e e2 b1 18 15 05 |b3...>H.Ej>.....|
00000020 f8 04 33 45 98 02 20 0d a8 92 af 84 f3 4a a0 09 |..3E.. ......J..|
00000030 f8 4a eb 2c 87 cb d4 80 a1 fb db 8f 9b 09 e8 ce |.J.,............|
00000040 80 d0 94 43 26 5f 75 |...C&_u|
[6c3 02-22 00:13:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6c4 02-22 00:13:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034cef30 gate 1582330429547659500 evaluation starts
[6c6 02-22 00:13:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034cef30 signed by 0 principal evaluation starts (used [false])
[6c5 02-22 00:13:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"g2C\276J/\372pf\335\366\027\264\203\023\251\344S\337&\265*/\336/\t\264UU{F\310" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\335}\274\246u\3009v\251\rJG\302\340\263@\370\313\341?\326!3\350\023\320{\335\206\341V" from 172.18.0.6:54038
[6c7 02-22 00:13:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c 98 cf f0 20 c7 d9 fd b9 ce d3 17 55 85 70 70 |,... .......U.pp|
00000010 b3 08 3a 82 2a 57 3b dc 6d e0 0c aa 7c 99 d3 24 |..:.*W;.m...|..$|
[6c8 02-22 00:13:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 39 e5 76 05 5a 87 1b c1 bc 4a |0E.!..9.v.Z....J|
00000010 fa 48 21 9f 38 e9 24 d8 07 78 26 8c de cc 3e f7 |.H!.8.$..x&...>.|
00000020 55 db 96 57 8b 02 20 5a 2a 5d b8 b3 15 ec 04 ff |U..W.. Z*]......|
00000030 56 be 70 f7 82 22 b6 ff 97 8b b6 36 91 cb 75 86 |V.p..".....6..u.|
00000040 9d 3b f3 b2 4f 1e bb |.;..O..|
[6c9 02-22 00:13:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:54038
[6ca 02-22 00:13:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:54038
[6cb 02-22 00:13:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034cef30 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6cc 02-22 00:13:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034cef30 principal evaluation succeeds for identity 0
[6cd 02-22 00:13:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034cef30 gate 1582330429547659500 evaluation succeeds
[6ce 02-22 00:13:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6cf 02-22 00:13:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6d0 02-22 00:13:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6d1 02-22 00:13:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6d2 02-22 00:13:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051
[6d3 02-22 00:13:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d4 02-22 00:13:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[6d5 02-22 00:13:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d6 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 8033404387853133216, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes
[6d7 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 8033404387853133216, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes
[6d8 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d9 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 8033404387853133216, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes
[6da 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[6db 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a 43 f7 4a cd 65 ca 1d 28 5c ac 9b 51 1d 2d 68 |.C.J.e..(\..Q.-h|
00000010 58 1d 95 93 ac 87 c1 25 b3 fb 6f d1 25 ab ca 88 |X......%..o.%...|
[6dc 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 98 ea c2 bb fb 3b 5a ff ba be |0E.!.......;Z...|
00000010 6f ba 44 99 36 0b e9 61 11 8d 92 84 68 56 e9 96 |o.D.6..a....hV..|
00000020 3b 72 fa 5e 4b 02 20 3a b9 b6 bc 38 01 0e 97 e1 |;r.^K. :...8....|
00000030 a0 69 40 f7 db fc 10 ed 77 ab b3 b3 70 be 9a 22 |.i@.....w...p.."|
00000040 a9 74 04 25 bf 43 0d |.t.%.C.|
[6dd 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes
[6de 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes
[6df 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e0 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[6e1 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e2 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6e3 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6e4 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6e5 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6e6 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6e7 02-22 00:13:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6e8 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 42 fa 52 a0 05 69 79 95 43 07 e9 2f 1b 99 7e |.B.R..iy.C../..~|
00000010 e5 ce a1 6f b6 f5 c3 8f 6e 29 a8 ce 8d 0a 7a 82 |...o....n)....z.|
[6e9 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 e5 4a fb c9 88 0d b9 c2 10 ce |0E.!...J........|
00000010 23 7f 1e 3e ce be e1 45 3d 50 c2 d0 ce c6 23 03 |#..>...E=P....#.|
00000020 37 63 fb f9 87 02 20 28 aa b8 61 7a a7 e2 7c 53 |7c.... (..az..|S|
00000030 0b f5 5f 8e 80 8a 10 96 b8 2f 4a 4c 48 78 00 24 |.._....../JLHx.$|
00000040 31 60 35 0a 1c 34 94 |1`5..4.|
[6ea 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6eb 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003529b70 gate 1582330429586046700 evaluation starts
[6ec 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003529b70 signed by 0 principal evaluation starts (used [false])
[6ed 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003529b70 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6ee 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003529b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6ef 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003529b70 principal evaluation fails
[6f0 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003529b70 gate 1582330429586046700 evaluation fails
[6f1 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6f2 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6f3 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6f4 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 42 fa 52 a0 05 69 79 95 43 07 e9 2f 1b 99 7e |.B.R..iy.C../..~|
00000010 e5 ce a1 6f b6 f5 c3 8f 6e 29 a8 ce 8d 0a 7a 82 |...o....n)....z.|
[6f5 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 e5 4a fb c9 88 0d b9 c2 10 ce |0E.!...J........|
00000010 23 7f 1e 3e ce be e1 45 3d 50 c2 d0 ce c6 23 03 |#..>...E=P....#.|
00000020 37 63 fb f9 87 02 20 28 aa b8 61 7a a7 e2 7c 53 |7c.... (..az..|S|
00000030 0b f5 5f 8e 80 8a 10 96 b8 2f 4a 4c 48 78 00 24 |.._....../JLHx.$|
00000040 31 60 35 0a 1c 34 94 |1`5..4.|
[6f6 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6f8 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540200 gate 1582330429589268500 evaluation starts
[6fa 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6fb 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540200 signed by 0 principal evaluation starts (used [false])
[6fc 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540200 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6f9 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:54038 disconnected
[6f7 02-22 00:13:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[6fd 02-22 00:13:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540200 principal evaluation succeeds for identity 0
[6fe 02-22 00:13:49.59 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-02-22T00:13:59.534Z grpc.peer_address=172.18.0.6:54038 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=55.6041ms
[700 02-22 00:13:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540200 gate 1582330429589268500 evaluation succeeds
[701 02-22 00:13:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[702 02-22 00:13:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[703 02-22 00:13:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[704 02-22 00:13:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[705 02-22 00:13:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes
[6ff 02-22 00:13:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[706 02-22 00:13:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]}
[707 02-22 00:13:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes
[708 02-22 00:13:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[709 02-22 00:13:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70a 02-22 00:13:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70b 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:1955021357186077940 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[70c 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:1955021357186077940 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[70d 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1955021357186077940 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[70e 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70f 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[710 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[711 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[712 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[713 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[714 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[715 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[716 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[717 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[718 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[719 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[71a 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[71b 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[71c 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[71d 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[71e 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 f9 71 01 b4 40 76 a9 d7 d6 f8 58 e6 52 9e a1 |H.q..@v....X.R..|
00000010 89 18 13 87 81 e0 46 6f 82 c3 65 45 20 f4 61 9d |......Fo..eE .a.|
[71f 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 9d ce f7 e1 20 cc 05 c9 aa 54 |0E.!...... ....T|
00000010 d9 32 85 f9 12 f0 59 00 79 d7 2a a3 a2 5b 74 5d |.2....Y.y.*..[t]|
00000020 8d 6f 37 c7 ab 02 20 40 cd 6d da 69 96 78 90 11 |.o7... @.m.i.x..|
00000030 77 98 49 58 b8 45 3a 24 76 98 47 db a0 fa bf 45 |w.IX.E:$v.G....E|
00000040 ce 8a 38 23 c8 19 f7 |..8#...|
[720 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[721 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355c9b0 gate 1582330429624019600 evaluation starts
[722 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355c9b0 signed by 0 principal evaluation starts (used [false])
[723 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355c9b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[724 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355c9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[725 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355c9b0 principal evaluation fails
[726 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355c9b0 gate 1582330429624019600 evaluation fails
[727 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[728 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[729 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[72a 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 f9 71 01 b4 40 76 a9 d7 d6 f8 58 e6 52 9e a1 |H.q..@v....X.R..|
00000010 89 18 13 87 81 e0 46 6f 82 c3 65 45 20 f4 61 9d |......Fo..eE .a.|
[72b 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 9d ce f7 e1 20 cc 05 c9 aa 54 |0E.!...... ....T|
00000010 d9 32 85 f9 12 f0 59 00 79 d7 2a a3 a2 5b 74 5d |.2....Y.y.*..[t]|
00000020 8d 6f 37 c7 ab 02 20 40 cd 6d da 69 96 78 90 11 |.o7... @.m.i.x..|
00000030 77 98 49 58 b8 45 3a 24 76 98 47 db a0 fa bf 45 |w.IX.E:$v.G....E|
00000040 ce 8a 38 23 c8 19 f7 |..8#...|
[72c 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[72d 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355d2b0 gate 1582330429625607500 evaluation starts
[72e 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355d2b0 signed by 0 principal evaluation starts (used [false])
[72f 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355d2b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[730 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355d2b0 principal evaluation succeeds for identity 0
[731 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355d2b0 gate 1582330429625607500 evaluation succeeds
[732 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[733 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[734 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[735 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[736 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes
[737 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes]}
[738 02-22 00:13:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:9
[739 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:9
[73a 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[73b 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[73c 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[73d 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[73e 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[73f 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[740 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[741 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes to 1 peers
[742 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 3, Dead: 0
[743 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes
[744 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[745 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[746 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13610968413913903053 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[747 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[748 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2390020757498825356 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[749 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2390020757498825356 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[74a 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74b 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13610968413913903053 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[74c 02-22 00:13:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[74d 02-22 00:13:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: ""
[74e 02-22 00:13:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme
[74f 02-22 00:13:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending update to cc: {[{peer1.org1.example.com:7051 0 <nil>}] <nil>}
[750 02-22 00:13:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first"
[751 02-22 00:13:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0035b8ae0, CONNECTING
[752 02-22 00:13:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151011
[753 02-22 00:13:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BE908F7861C863F4FDDCBA1DD70869A2FA6ED2D8C87945430BCCE5A8C4AC5E54
[754 02-22 00:13:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[755 02-22 00:13:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[756 02-22 00:13:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[757 02-22 00:13:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[758 02-22 00:13:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[759 02-22 00:13:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[75a 02-22 00:13:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[75b 02-22 00:13:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[75c 02-22 00:13:49.65 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-02-22T00:13:51.656Z grpc.peer_address=172.18.0.6:54042 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=137.6µs
[75d 02-22 00:13:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0035b8ae0, READY
[75e 02-22 00:13:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[75f 02-22 00:13:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[760 02-22 00:13:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQQIM2ou9DqfvkKtiUOZHklTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEI9vXO2dg2ogF\n9G7NkteaJapySU671RiKcInNv3OAdIr+xsn11Wf7TM694Ow7/GWsGU71oZTZbHfw\ni5SfKlabMqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAg0y4VvcZCLdSplahOGKT05hcJiRUeoqVmEQhWb+p7yNEwCgYIKoZIzj0E\nAwIDRwAwRAIgHtaqhr9/bxigCyhuKqYqDztw3uE11quIZ7drkaY/mvQCIGVtipl+\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:54042
[761 02-22 00:13:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[762 02-22 00:13:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[763 02-22 00:13:49.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:7051
[764 02-22 00:13:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2390020757498825356 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 50 bytes, Signature: 0 bytes
[765 02-22 00:13:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2390020757498825356 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 50 bytes, Signature: 0 bytes
[766 02-22 00:13:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2390020757498825356 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 50 bytes, Signature: 0 bytes
[767 02-22 00:13:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[768 02-22 00:13:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"g2C\276J/\372pf\335\366\027\264\203\023\251\344S\337&\265*/\336/\t\264UU{F\310" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\335}\274\246u\3009v\251\rJG\302\340\263@\370\313\341?\326!3\350\023\320{\335\206\341V" from 172.18.0.6:54042
[769 02-22 00:13:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c 98 cf f0 20 c7 d9 fd b9 ce d3 17 55 85 70 70 |,... .......U.pp|
00000010 b3 08 3a 82 2a 57 3b dc 6d e0 0c aa 7c 99 d3 24 |..:.*W;.m...|..$|
[76a 02-22 00:13:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 b9 e4 27 8d 03 3d 2c 31 fb 1f a4 |0D. ...'..=,1...|
00000010 48 d5 fa b9 89 9e 84 1f 0c 99 37 42 22 7f df ef |H.........7B"...|
00000020 fc a0 5c dd 02 20 3e 38 54 a7 95 9e 23 99 f8 b9 |..\.. >8T...#...|
00000030 17 b8 4d bc d3 13 44 af a6 81 c2 b6 fe 55 7e a8 |..M...D......U~.|
00000040 e5 fd f5 5d b5 11 |...]..|
[76b 02-22 00:13:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"g2C\276J/\372pf\335\366\027\264\203\023\251\344S\337&\265*/\336/\t\264UU{F\310" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\335}\274\246u\3009v\251\rJG\302\340\263@\370\313\341?\326!3\350\023\320{\335\206\341V" from 172.18.0.6:7051
[76c 02-22 00:13:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:54042
[76e 02-22 00:13:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:54042
[76d 02-22 00:13:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c 98 cf f0 20 c7 d9 fd b9 ce d3 17 55 85 70 70 |,... .......U.pp|
00000010 b3 08 3a 82 2a 57 3b dc 6d e0 0c aa 7c 99 d3 24 |..:.*W;.m...|..$|
[76f 02-22 00:13:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54042 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 11166122692380403922, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 282 bytes, Signature: 0 bytes
[771 02-22 00:13:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[772 02-22 00:13:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 11166122692380403922, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 282 bytes, Signature: 0 bytes
[773 02-22 00:13:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[774 02-22 00:13:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 80 9d 61 47 b4 1e 31 38 a1 9e d8 3d de 64 63 |...aG..18...=.dc|
00000010 df fd 06 03 7d fa 9d 51 3b 75 33 32 db d8 22 18 |....}..Q;u32..".|
[775 02-22 00:13:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 87 2b 09 59 c4 53 6d 08 00 e8 bd |0D. U.+.Y.Sm....|
00000010 a2 8c 64 75 e4 ac 64 02 b7 20 45 b0 c4 b6 5c c3 |..du..d.. E...\.|
00000020 d7 10 d1 87 02 20 1c 35 cf 7f db 01 78 b1 9d 9e |..... .5....x...|
00000030 29 3a 08 1f cb dc 39 90 5e 18 5d f5 39 c2 3f 0a |):....9.^.].9.?.|
00000040 ce 1e 2b 2e f9 c9 |..+...|
[770 02-22 00:13:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 ef af 6c a5 56 fc 8b 78 0a df |0E.!....l.V..x..|
00000010 10 47 4f 54 ca 8c cd 1a d3 96 8f f2 87 c6 c6 cf |.GOT............|
00000020 a9 ba 5c 0d 8f 02 20 01 a5 27 35 1a 64 89 0d ee |..\... ..'5.d...|
00000030 f3 51 f9 73 80 00 a7 ad d2 5b 0a 41 a1 d5 da cb |.Q.s.....[.A....|
00000040 e1 3b c9 7d 29 b0 e8 |.;.})..|
[776 02-22 00:13:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[777 02-22 00:13:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef df 8d 3a 34 a1 12 a1 d1 d7 b8 |0E.!....:4......|
00000010 06 42 77 8e d9 d7 7e f0 11 33 cd 2b 98 3a e2 0d |.Bw...~..3.+.:..|
00000020 9d c5 0a f1 36 02 20 7e 55 9f 2d 4f 9e 43 37 6b |....6. ~U.-O.C7k|
00000030 f9 eb 3c 2b 09 ad b2 16 aa 3a c8 7f 25 9b da 2f |..<+.....:..%../|
00000040 11 6f 54 13 3e 43 20 |.oT.>C |
[778 02-22 00:13:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[779 02-22 00:13:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[77a 02-22 00:13:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:20
[77b 02-22 00:13:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:20
[77c 02-22 00:13:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[77d 02-22 00:13:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[77e 02-22 00:13:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[77f 02-22 00:13:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[780 02-22 00:13:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051
[781 02-22 00:13:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[782 02-22 00:13:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[783 02-22 00:13:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[784 02-22 00:13:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[786 02-22 00:13:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[785 02-22 00:13:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[787 02-22 00:13:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[788 02-22 00:13:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 11166122692380403922, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes to 1 peers
[789 02-22 00:13:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[78a 02-22 00:13:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 11166122692380403922, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes
[78b 02-22 00:13:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[78c 02-22 00:13:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[78d 02-22 00:13:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:54042 disconnected
[78e 02-22 00:13:49.72 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:54042 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=56.6836ms
[78f 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[790 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes
[791 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes
[792 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[793 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes
[794 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[795 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 5e 61 2a 29 01 a3 8b 07 9a cd 34 8a 6c 8e 30 |.^a*)......4.l.0|
00000010 02 ad 65 27 f2 e8 65 e5 bf 60 f9 ed 38 0b 19 d7 |..e'..e..`..8...|
[796 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 0c 5f c3 72 2e eb 83 68 58 fb |0E.!..._.r...hX.|
00000010 d2 f2 be eb 6d 33 02 ce bf 47 c8 7c 4d 52 ef 0c |....m3...G.|MR..|
00000020 5e a0 17 71 0c 02 20 36 a7 5a 17 28 0b da 7d 40 |^..q.. 6.Z.(..}@|
00000030 64 fd 69 ee 76 5e d6 78 52 6e a6 45 b7 f5 08 b2 |d.i.v^.xRn.E....|
00000040 61 f3 dc 9b e6 17 d5 |a......|
[797 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes
[798 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes]}
[799 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:21
[79a 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:21
[79b 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[79c 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79d 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79e 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[79f 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 90 8f 78 61 c8 63 f4 fd dc ba 1d d7 08 69 a2 |...xa.c.......i.|
00000010 fa 6e d2 d8 c8 79 45 43 0b cc e5 a8 c4 ac 5e 54 |.n...yEC......^T|
[7a0 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 fb c8 04 f0 f4 6c c3 75 1f 9f 16 |0D. H.....l.u...|
00000010 1c bf 1a 06 a1 93 7a 3b 79 5e 1f 68 35 12 ef f0 |......z;y^.h5...|
00000020 7d 0c d0 e9 02 20 2c ab f0 fc a9 18 91 3f 0c 82 |}.... ,......?..|
00000030 92 c6 7f 46 ce 0f c2 19 54 a7 64 29 ae d6 2a e7 |...F....T.d)..*.|
00000040 92 72 3a d4 82 a9 |.r:...|
[7a1 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes
[7a2 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes
[7a3 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7a4 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[7a5 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a6 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7a7 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7a8 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7a9 02-22 00:13:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7aa 02-22 00:13:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7ab 02-22 00:13:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7ac 02-22 00:13:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 42 fa 52 a0 05 69 79 95 43 07 e9 2f 1b 99 7e |.B.R..iy.C../..~|
00000010 e5 ce a1 6f b6 f5 c3 8f 6e 29 a8 ce 8d 0a 7a 82 |...o....n)....z.|
[7ad 02-22 00:13:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 e5 4a fb c9 88 0d b9 c2 10 ce |0E.!...J........|
00000010 23 7f 1e 3e ce be e1 45 3d 50 c2 d0 ce c6 23 03 |#..>...E=P....#.|
00000020 37 63 fb f9 87 02 20 28 aa b8 61 7a a7 e2 7c 53 |7c.... (..az..|S|
00000030 0b f5 5f 8e 80 8a 10 96 b8 2f 4a 4c 48 78 00 24 |.._....../JLHx.$|
00000040 31 60 35 0a 1c 34 94 |1`5..4.|
[7ae 02-22 00:13:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7af 02-22 00:13:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366c600 gate 1582330429740302700 evaluation starts
[7b0 02-22 00:13:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366c600 signed by 0 principal evaluation starts (used [false])
[7b1 02-22 00:13:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366c600 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7b2 02-22 00:13:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366c600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7b3 02-22 00:13:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366c600 principal evaluation fails
[7b4 02-22 00:13:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366c600 gate 1582330429740302700 evaluation fails
[7b6 02-22 00:13:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7b5 02-22 00:13:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7b7 02-22 00:13:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7b8 02-22 00:13:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7b9 02-22 00:13:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 42 fa 52 a0 05 69 79 95 43 07 e9 2f 1b 99 7e |.B.R..iy.C../..~|
00000010 e5 ce a1 6f b6 f5 c3 8f 6e 29 a8 ce 8d 0a 7a 82 |...o....n)....z.|
[7ba 02-22 00:13:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 e5 4a fb c9 88 0d b9 c2 10 ce |0E.!...J........|
00000010 23 7f 1e 3e ce be e1 45 3d 50 c2 d0 ce c6 23 03 |#..>...E=P....#.|
00000020 37 63 fb f9 87 02 20 28 aa b8 61 7a a7 e2 7c 53 |7c.... (..az..|S|
00000030 0b f5 5f 8e 80 8a 10 96 b8 2f 4a 4c 48 78 00 24 |.._....../JLHx.$|
00000040 31 60 35 0a 1c 34 94 |1`5..4.|
[7bb 02-22 00:13:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7bc 02-22 00:13:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366cf00 gate 1582330429751724300 evaluation starts
[7bd 02-22 00:13:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366cf00 signed by 0 principal evaluation starts (used [false])
[7be 02-22 00:13:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366cf00 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7bf 02-22 00:13:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366cf00 principal evaluation succeeds for identity 0
[7c0 02-22 00:13:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366cf00 gate 1582330429751724300 evaluation succeeds
[7c1 02-22 00:13:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7c2 02-22 00:13:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7c3 02-22 00:13:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7c4 02-22 00:13:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7c5 02-22 00:13:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes
[7c6 02-22 00:13:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU got old alive message about alive peer Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 lastAliveTS: 1582330413587055600, 9 but got ts: inc_num:1582330413587055600 seq_num:8
[7c7 02-22 00:13:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c8 02-22 00:13:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c9 02-22 00:13:50.17 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-02-22T00:13:52.175Z grpc.peer_address=172.18.0.7:34092 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=216.8µs
[7ca 02-22 00:13:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[7cb 02-22 00:13:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[7cc 02-22 00:13:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:34092
[7cd 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\033-\316\317\252\020\230HT\305\2621\227\207D\016\037\224g}\257l1\224\340\344\277`\030QN\t" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\n9c39/yCaZdGN1KZ4nkfCncYA4rR07vJKKu1pdw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\346\275\301Z\306\337\177\302R\177H\356D\361IO\206\353\326\3060\305\201(d\377J\277\214s\257\354" from 172.18.0.7:34092
[7ce 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7cf 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7d0 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d1 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7d2 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d3 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7d4 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7d5 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7d6 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7d7 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7d8 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7d9 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 55 c0 45 a2 0c 75 a8 2b 12 9b 9f 9f e2 bc 2d |.U.E..u.+......-|
00000010 c4 35 8a 2c c6 50 7a 01 37 e3 a3 c4 bf 81 b9 d2 |.5.,.Pz.7.......|
[7da 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 37 be bf b9 8a e7 50 bc b5 cc b2 |0D. g7.....P....|
00000010 4b 4d 8c 73 26 ed c5 8d 18 70 26 30 da 27 53 5b |KM.s&....p&0.'S[|
00000020 7b 82 30 d2 02 20 63 46 c1 73 cf 02 96 8b 7a 52 |{.0.. cF.s....zR|
00000030 e5 6f 01 c0 da 8c 3d 20 da 5f 57 b2 f3 ac 08 35 |.o....= ._W....5|
00000040 5c cd 31 2d e6 1a |\.1-..|
[7db 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7dc 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c3060 gate 1582330430185145400 evaluation starts
[7dd 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c3060 signed by 0 principal evaluation starts (used [false])
[7de 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c3060 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7df 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c3060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7e0 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c3060 principal evaluation fails
[7e1 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c3060 gate 1582330430185145400 evaluation fails
[7e2 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7e3 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7e4 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7e5 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 55 c0 45 a2 0c 75 a8 2b 12 9b 9f 9f e2 bc 2d |.U.E..u.+......-|
00000010 c4 35 8a 2c c6 50 7a 01 37 e3 a3 c4 bf 81 b9 d2 |.5.,.Pz.7.......|
[7e6 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 37 be bf b9 8a e7 50 bc b5 cc b2 |0D. g7.....P....|
00000010 4b 4d 8c 73 26 ed c5 8d 18 70 26 30 da 27 53 5b |KM.s&....p&0.'S[|
00000020 7b 82 30 d2 02 20 63 46 c1 73 cf 02 96 8b 7a 52 |{.0.. cF.s....zR|
00000030 e5 6f 01 c0 da 8c 3d 20 da 5f 57 b2 f3 ac 08 35 |.o....= ._W....5|
00000040 5c cd 31 2d e6 1a |\.1-..|
[7e7 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7e8 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c3960 gate 1582330430185939700 evaluation starts
[7e9 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c3960 signed by 0 principal evaluation starts (used [false])
[7ea 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c3960 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7eb 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c3960 principal evaluation succeeds for identity 0
[7ec 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c3960 gate 1582330430185939700 evaluation succeeds
[7ed 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7ee 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7ef 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7f0 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7f1 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:34092
[7f2 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:34092
[7f3 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7f4 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[7f5 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[7f6 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[7f7 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7f8 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[7f9 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:34092 disconnected
[7fa 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-02-22T00:14:00.178Z grpc.peer_address=172.18.0.7:34092 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.7877ms
[7fb 02-22 00:13:50.18 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[7fc 02-22 00:13:50.27 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-02-22T00:13:52.274Z grpc.peer_address=172.18.0.7:34094 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=247.3µs
[7fd 02-22 00:13:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[7fe 02-22 00:13:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[7ff 02-22 00:13:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:34094
[800 02-22 00:13:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\033-\316\317\252\020\230HT\305\2621\227\207D\016\037\224g}\257l1\224\340\344\277`\030QN\t" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\n9c39/yCaZdGN1KZ4nkfCncYA4rR07vJKKu1pdw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\346\275\301Z\306\337\177\302R\177H\356D\361IO\206\353\326\3060\305\201(d\377J\277\214s\257\354" from 172.18.0.7:34094
[801 02-22 00:13:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[802 02-22 00:13:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[803 02-22 00:13:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[804 02-22 00:13:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[805 02-22 00:13:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[806 02-22 00:13:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[807 02-22 00:13:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[808 02-22 00:13:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[809 02-22 00:13:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[80a 02-22 00:13:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[80b 02-22 00:13:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[80c 02-22 00:13:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 55 c0 45 a2 0c 75 a8 2b 12 9b 9f 9f e2 bc 2d |.U.E..u.+......-|
00000010 c4 35 8a 2c c6 50 7a 01 37 e3 a3 c4 bf 81 b9 d2 |.5.,.Pz.7.......|
[80d 02-22 00:13:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 63 79 bc 30 a6 bf 48 0c 0f 04 |0E.!..cy.0..H...|
00000010 5c 6a 30 56 48 e2 cc d3 da 43 b2 b6 23 41 66 5c |\j0VH....C..#Af\|
00000020 56 1d d4 25 8f 02 20 70 d2 a0 02 ac a0 68 43 6b |V..%.. p.....hCk|
00000030 0d 88 54 96 22 29 74 1b 0c 6a 8d 88 66 c1 e3 9f |..T.")t..j..f...|
00000040 ba 4e cd c0 53 8f 41 |.N..S.A|
[80e 02-22 00:13:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[80f 02-22 00:13:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[810 02-22 00:13:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728fb0 gate 1582330430295355500 evaluation starts
[811 02-22 00:13:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728fb0 signed by 0 principal evaluation starts (used [false])
[812 02-22 00:13:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728fb0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[814 02-22 00:13:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[813 02-22 00:13:50.30 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-02-22T00:13:52.305Z grpc.peer_address=172.18.0.7:34096 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=128.9µs
[815 02-22 00:13:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728fb0 principal evaluation fails
[816 02-22 00:13:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728fb0 gate 1582330430295355500 evaluation fails
[817 02-22 00:13:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[818 02-22 00:13:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[819 02-22 00:13:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[81a 02-22 00:13:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 55 c0 45 a2 0c 75 a8 2b 12 9b 9f 9f e2 bc 2d |.U.E..u.+......-|
00000010 c4 35 8a 2c c6 50 7a 01 37 e3 a3 c4 bf 81 b9 d2 |.5.,.Pz.7.......|
[81b 02-22 00:13:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 63 79 bc 30 a6 bf 48 0c 0f 04 |0E.!..cy.0..H...|
00000010 5c 6a 30 56 48 e2 cc d3 da 43 b2 b6 23 41 66 5c |\j0VH....C..#Af\|
00000020 56 1d d4 25 8f 02 20 70 d2 a0 02 ac a0 68 43 6b |V..%.. p.....hCk|
00000030 0d 88 54 96 22 29 74 1b 0c 6a 8d 88 66 c1 e3 9f |..T.")t..j..f...|
00000040 ba 4e cd c0 53 8f 41 |.N..S.A|
[81c 02-22 00:13:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[81d 02-22 00:13:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037298b0 gate 1582330430309313500 evaluation starts
[81e 02-22 00:13:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037298b0 signed by 0 principal evaluation starts (used [false])
[81f 02-22 00:13:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037298b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[820 02-22 00:13:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037298b0 principal evaluation succeeds for identity 0
[821 02-22 00:13:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037298b0 gate 1582330430309313500 evaluation succeeds
[822 02-22 00:13:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[823 02-22 00:13:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[824 02-22 00:13:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQQIM2ou9DqfvkKtiUOZHklTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEI9vXO2dg2ogF\n9G7NkteaJapySU671RiKcInNv3OAdIr+xsn11Wf7TM694Ow7/GWsGU71oZTZbHfw\ni5SfKlabMqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAg0y4VvcZCLdSplahOGKT05hcJiRUeoqVmEQhWb+p7yNEwCgYIKoZIzj0E\nAwIDRwAwRAIgHtaqhr9/bxigCyhuKqYqDztw3uE11quIZ7drkaY/mvQCIGVtipl+\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:34096
[825 02-22 00:13:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\033-\316\317\252\020\230HT\305\2621\227\207D\016\037\224g}\257l1\224\340\344\277`\030QN\t" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\n9c39/yCaZdGN1KZ4nkfCncYA4rR07vJKKu1pdw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\346\275\301Z\306\337\177\302R\177H\356D\361IO\206\353\326\3060\305\201(d\377J\277\214s\257\354" from 172.18.0.7:34096
[826 02-22 00:13:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[827 02-22 00:13:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[828 02-22 00:13:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[829 02-22 00:13:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[82a 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82b 02-22 00:13:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[82c 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[82d 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[82e 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[82f 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:34094
[830 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:34094
[831 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[832 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:34094 disconnected
[833 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-02-22T00:14:00.278Z grpc.peer_address=172.18.0.7:34094 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=44.2316ms
[834 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[835 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[836 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[837 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[838 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[839 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[83a 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[83b 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 55 c0 45 a2 0c 75 a8 2b 12 9b 9f 9f e2 bc 2d |.U.E..u.+......-|
00000010 c4 35 8a 2c c6 50 7a 01 37 e3 a3 c4 bf 81 b9 d2 |.5.,.Pz.7.......|
[83c 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 98 2f c9 13 92 a7 83 b8 ec 01 40 |0D. q./........@|
00000010 cd 19 29 cc c9 e8 38 ae c8 5d 5e 05 d2 f8 d7 ea |..)...8..]^.....|
00000020 e2 93 d0 b5 02 20 41 f6 e8 b5 ae 13 8a 12 8e 27 |..... A........'|
00000030 c7 b0 04 c5 2c 0d e9 1f c7 93 c1 3e db dd ab c9 |....,......>....|
00000040 90 49 ef 57 31 fb |.I.W1.|
[83d 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[83e 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792290 gate 1582330430327082300 evaluation starts
[83f 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792290 signed by 0 principal evaluation starts (used [false])
[840 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792290 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[841 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[842 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792290 principal evaluation fails
[843 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792290 gate 1582330430327082300 evaluation fails
[844 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[845 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[846 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[847 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 55 c0 45 a2 0c 75 a8 2b 12 9b 9f 9f e2 bc 2d |.U.E..u.+......-|
00000010 c4 35 8a 2c c6 50 7a 01 37 e3 a3 c4 bf 81 b9 d2 |.5.,.Pz.7.......|
[848 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 98 2f c9 13 92 a7 83 b8 ec 01 40 |0D. q./........@|
00000010 cd 19 29 cc c9 e8 38 ae c8 5d 5e 05 d2 f8 d7 ea |..)...8..]^.....|
00000020 e2 93 d0 b5 02 20 41 f6 e8 b5 ae 13 8a 12 8e 27 |..... A........'|
00000030 c7 b0 04 c5 2c 0d e9 1f c7 93 c1 3e db dd ab c9 |....,......>....|
00000040 90 49 ef 57 31 fb |.I.W1.|
[849 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[84a 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792b90 gate 1582330430328754700 evaluation starts
[84b 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792b90 signed by 0 principal evaluation starts (used [false])
[84c 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792b90 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[84d 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792b90 principal evaluation succeeds for identity 0
[84e 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792b90 gate 1582330430328754700 evaluation succeeds
[84f 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[850 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[851 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[852 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[853 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:34096
[854 02-22 00:13:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:34096
[855 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 14096646716103905678, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[856 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[857 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 14096646716103905678, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[858 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[859 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[85a 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[85b 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[85c 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[85d 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[85e 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[85f 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[860 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 5c 38 0d 61 b3 96 ff ef 02 4a ae 66 86 37 40 |E\8.a.....J.f.7@|
00000010 b4 c1 e3 a1 55 85 48 0a 0e 79 4d be 78 c3 38 83 |....U.H..yM.x.8.|
[861 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da df 6a 75 b8 18 d9 7b 4d d1 a7 |0E.!...ju...{M..|
00000010 cd e0 3e 23 ea d8 98 30 ba 7b 89 ea dd 4e 1b ac |..>#...0.{...N..|
00000020 6e f9 b5 d5 6e 02 20 7c a2 92 52 01 56 69 cb ee |n...n. |..R.Vi..|
00000030 57 72 90 b4 37 dd 6e 16 a3 39 b1 60 04 d8 1c df |Wr..7.n..9.`....|
00000040 dc 73 5d 43 81 8d aa |.s]C...|
[862 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[863 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037aabe0 gate 1582330430334832200 evaluation starts
[864 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037aabe0 signed by 0 principal evaluation starts (used [false])
[865 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037aabe0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[866 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037aabe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[867 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037aabe0 principal evaluation fails
[868 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037aabe0 gate 1582330430334832200 evaluation fails
[869 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[86a 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[86b 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[86c 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 5c 38 0d 61 b3 96 ff ef 02 4a ae 66 86 37 40 |E\8.a.....J.f.7@|
00000010 b4 c1 e3 a1 55 85 48 0a 0e 79 4d be 78 c3 38 83 |....U.H..yM.x.8.|
[86d 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da df 6a 75 b8 18 d9 7b 4d d1 a7 |0E.!...ju...{M..|
00000010 cd e0 3e 23 ea d8 98 30 ba 7b 89 ea dd 4e 1b ac |..>#...0.{...N..|
00000020 6e f9 b5 d5 6e 02 20 7c a2 92 52 01 56 69 cb ee |n...n. |..R.Vi..|
00000030 57 72 90 b4 37 dd 6e 16 a3 39 b1 60 04 d8 1c df |Wr..7.n..9.`....|
00000040 dc 73 5d 43 81 8d aa |.s]C...|
[86e 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[86f 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ab4e0 gate 1582330430336838300 evaluation starts
[870 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ab4e0 signed by 0 principal evaluation starts (used [false])
[871 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ab4e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[872 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ab4e0 principal evaluation succeeds for identity 0
[873 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ab4e0 gate 1582330430336838300 evaluation succeeds
[874 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[875 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[876 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[877 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[878 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes
[879 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes]}
[87a 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:18
[87b 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:18
[87c 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:9 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[87d 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87e 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87f 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[880 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[881 02-22 00:13:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[882 02-22 00:13:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[883 02-22 00:13:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 14096646716103905678, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 499 bytes, Signature: 0 bytes to 1 peers
[884 02-22 00:13:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 3, Dead: 0
[885 02-22 00:13:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 14096646716103905678, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 499 bytes, Signature: 0 bytes
[886 02-22 00:13:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[887 02-22 00:13:50.44 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-02-22T00:13:52.44Z grpc.peer_address=172.18.0.8:37612 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=231.5µs
[888 02-22 00:13:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[889 02-22 00:13:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[88a 02-22 00:13:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:37612
[88b 02-22 00:13:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\002W@\255\334\245\001k\370D\037\350\034\344yn\266[\024\252\232\377Y]\374\025\253\032\331g\272v" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nMevsRsxCuskTwdllQ6KULSbCY3SKOCD0VFYIqQ==\n-----END CERTIFICATE-----\n" tls_cert_hash:"o\3350\243\211\340\321\020so\247b\362\033\352\004\0071\321\002\217\273\202\252Cg\212\233\322\220m^" from 172.18.0.8:37612
[88c 02-22 00:13:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88d 02-22 00:13:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88e 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[88f 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[890 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[891 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[892 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[893 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[894 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[895 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[896 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[897 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[898 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[899 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[89a 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[89b 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[89c 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 de 4a 51 e9 bc de 50 f6 fa c0 37 5e a6 ad f2 |..JQ...P...7^...|
00000010 cc 1a 7d 8f b0 fc 1c d6 5b b3 db 0f 40 60 ef 6f |..}.....[...@`.o|
[89d 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d c3 3f d9 9c 02 d1 ee cd 3a a4 0d |0D. }.?......:..|
00000010 5e a0 98 dc b0 7f 15 3e c8 e7 f3 5c 28 e1 32 92 |^......>...\(.2.|
00000020 f8 1b 68 64 02 20 50 30 a7 53 44 35 55 33 31 78 |..hd. P0.SD5U31x|
00000030 25 d1 e3 1b 07 d5 5f e5 37 3e 1f 17 23 9c 7a f3 |%....._.7>..#.z.|
00000040 7b 97 7f 03 20 97 |{... .|
[89e 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[89f 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816e20 gate 1582330430457421200 evaluation starts
[8a0 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816e20 signed by 0 principal evaluation starts (used [false])
[8a1 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816e20 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8a2 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8a3 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816e20 principal evaluation fails
[8a4 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816e20 gate 1582330430457421200 evaluation fails
[8a5 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8a6 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8a7 02-22 00:13:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8a8 02-22 00:13:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 de 4a 51 e9 bc de 50 f6 fa c0 37 5e a6 ad f2 |..JQ...P...7^...|
00000010 cc 1a 7d 8f b0 fc 1c d6 5b b3 db 0f 40 60 ef 6f |..}.....[...@`.o|
[8a9 02-22 00:13:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d c3 3f d9 9c 02 d1 ee cd 3a a4 0d |0D. }.?......:..|
00000010 5e a0 98 dc b0 7f 15 3e c8 e7 f3 5c 28 e1 32 92 |^......>...\(.2.|
00000020 f8 1b 68 64 02 20 50 30 a7 53 44 35 55 33 31 78 |..hd. P0.SD5U31x|
00000030 25 d1 e3 1b 07 d5 5f e5 37 3e 1f 17 23 9c 7a f3 |%....._.7>..#.z.|
00000040 7b 97 7f 03 20 97 |{... .|
[8aa 02-22 00:13:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8ab 02-22 00:13:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003817740 gate 1582330430462401000 evaluation starts
[8ac 02-22 00:13:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003817740 signed by 0 principal evaluation starts (used [false])
[8ad 02-22 00:13:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003817740 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8ae 02-22 00:13:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP
[8af 02-22 00:13:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[8b0 02-22 00:13:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003817740 principal evaluation succeeds for identity 0
[8b1 02-22 00:13:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003817740 gate 1582330430462401000 evaluation succeeds
[8b2 02-22 00:13:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8b3 02-22 00:13:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8b4 02-22 00:13:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8b5 02-22 00:13:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8b6 02-22 00:13:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:37612
[8b7 02-22 00:13:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:37612
[8b8 02-22 00:13:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[8b9 02-22 00:13:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:37612 disconnected
[8ba 02-22 00:13:50.48 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-02-22T00:14:00.445Z grpc.peer_address=172.18.0.8:37612 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=36.6918ms
[8bb 02-22 00:13:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[8bc 02-22 00:13:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[8bd 02-22 00:13:50.50 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-02-22T00:13:52.504Z grpc.peer_address=172.18.0.8:37614 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=123.1µs
[8be 02-22 00:13:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[8bf 02-22 00:13:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[8c0 02-22 00:13:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:37614
[8c1 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\002W@\255\334\245\001k\370D\037\350\034\344yn\266[\024\252\232\377Y]\374\025\253\032\331g\272v" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nMevsRsxCuskTwdllQ6KULSbCY3SKOCD0VFYIqQ==\n-----END CERTIFICATE-----\n" tls_cert_hash:"o\3350\243\211\340\321\020so\247b\362\033\352\004\0071\321\002\217\273\202\252Cg\212\233\322\220m^" from 172.18.0.8:37614
[8c2 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c3 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8c4 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c5 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8c6 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c7 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8c8 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8c9 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8ca 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8cb 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8cc 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8cd 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 de 4a 51 e9 bc de 50 f6 fa c0 37 5e a6 ad f2 |..JQ...P...7^...|
00000010 cc 1a 7d 8f b0 fc 1c d6 5b b3 db 0f 40 60 ef 6f |..}.....[...@`.o|
[8ce 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 04 08 80 35 5f f2 6f e5 b6 5d 0a |0D. ....5_.o..].|
00000010 af 7d fc 36 73 a0 59 74 a3 ed 10 c5 52 68 2e 84 |.}.6s.Yt....Rh..|
00000020 c7 da 99 a3 02 20 49 0f 22 78 f2 04 b4 e0 48 bf |..... I."x....H.|
00000030 e7 2b ea 7e cf 4a cc be a6 1b 69 1a 5d 2e c7 3d |.+.~.J....i.]..=|
00000040 7d 25 50 53 a4 cf |}%PS..|
[8cf 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8d0 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387d4a0 gate 1582330430512537500 evaluation starts
[8d1 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387d4a0 signed by 0 principal evaluation starts (used [false])
[8d2 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387d4a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8d3 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387d4a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8d4 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387d4a0 principal evaluation fails
[8d5 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387d4a0 gate 1582330430512537500 evaluation fails
[8d6 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8d7 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8d8 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8d9 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 de 4a 51 e9 bc de 50 f6 fa c0 37 5e a6 ad f2 |..JQ...P...7^...|
00000010 cc 1a 7d 8f b0 fc 1c d6 5b b3 db 0f 40 60 ef 6f |..}.....[...@`.o|
[8da 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 04 08 80 35 5f f2 6f e5 b6 5d 0a |0D. ....5_.o..].|
00000010 af 7d fc 36 73 a0 59 74 a3 ed 10 c5 52 68 2e 84 |.}.6s.Yt....Rh..|
00000020 c7 da 99 a3 02 20 49 0f 22 78 f2 04 b4 e0 48 bf |..... I."x....H.|
00000030 e7 2b ea 7e cf 4a cc be a6 1b 69 1a 5d 2e c7 3d |.+.~.J....i.]..=|
00000040 7d 25 50 53 a4 cf |}%PS..|
[8db 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8dc 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387dda0 gate 1582330430516397300 evaluation starts
[8dd 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387dda0 signed by 0 principal evaluation starts (used [false])
[8de 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387dda0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8df 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387dda0 principal evaluation succeeds for identity 0
[8e0 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387dda0 gate 1582330430516397300 evaluation succeeds
[8e1 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8e2 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8e3 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8e4 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8e5 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:37614
[8e6 02-22 00:13:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:37614
[8e7 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37614 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 14500854287958219383, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[8e8 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e9 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 14500854287958219383, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[8ea 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[8eb 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ec 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8ed 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8ee 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8ef 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8f0 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8f1 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8f2 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 f5 68 e4 51 70 ea ed b2 21 ba eb 8b 75 db 31 |..h.Qp...!...u.1|
00000010 51 df ce 3f 40 7e a6 c9 0c aa 97 ba 96 dd 51 8e |Q..?@~........Q.|
[8f3 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b fd e7 d0 10 fc 35 56 6a e2 54 |0E.!.......5Vj.T|
00000010 72 36 be 22 6e 85 a1 4f ef 7e 39 73 f2 08 d4 b4 |r6."n..O.~9s....|
00000020 08 44 63 47 1f 02 20 30 11 c8 0b 7e 67 ca 12 45 |.DcG.. 0...~g..E|
00000030 17 d4 73 08 02 e0 74 0c 94 cb 7d 3a bf f0 26 5c |..s...t...}:..&\|
00000040 48 34 68 12 56 a0 6b |H4h.V.k|
[8f4 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f5 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389c880 gate 1582330430532664300 evaluation starts
[8f6 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389c880 signed by 0 principal evaluation starts (used [false])
[8f7 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389c880 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8f8 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389c880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8f9 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389c880 principal evaluation fails
[8fa 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389c880 gate 1582330430532664300 evaluation fails
[8fb 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8fc 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8fd 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8fe 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 f5 68 e4 51 70 ea ed b2 21 ba eb 8b 75 db 31 |..h.Qp...!...u.1|
00000010 51 df ce 3f 40 7e a6 c9 0c aa 97 ba 96 dd 51 8e |Q..?@~........Q.|
[8ff 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b fd e7 d0 10 fc 35 56 6a e2 54 |0E.!.......5Vj.T|
00000010 72 36 be 22 6e 85 a1 4f ef 7e 39 73 f2 08 d4 b4 |r6."n..O.~9s....|
00000020 08 44 63 47 1f 02 20 30 11 c8 0b 7e 67 ca 12 45 |.DcG.. 0...~g..E|
00000030 17 d4 73 08 02 e0 74 0c 94 cb 7d 3a bf f0 26 5c |..s...t...}:..&\|
00000040 48 34 68 12 56 a0 6b |H4h.V.k|
[900 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[901 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d180 gate 1582330430533770000 evaluation starts
[902 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d180 signed by 0 principal evaluation starts (used [false])
[903 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d180 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[904 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d180 principal evaluation succeeds for identity 0
[905 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d180 gate 1582330430533770000 evaluation succeeds
[906 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[907 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[908 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[909 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[90a 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes
[90b 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]}
[90c 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes
[90d 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90e 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90f 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[910 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[911 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[912 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[913 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[914 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 14500854287958219383, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 660 bytes, Signature: 0 bytes to 1 peers
[915 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[916 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 14500854287958219383, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 660 bytes, Signature: 0 bytes
[917 02-22 00:13:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[918 02-22 00:13:50.59 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-02-22T00:13:52.599Z grpc.peer_address=172.18.0.8:37618 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=199.3µs
[919 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[91a 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[91b 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:37618
[91c 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\002W@\255\334\245\001k\370D\037\350\034\344yn\266[\024\252\232\377Y]\374\025\253\032\331g\272v" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nMevsRsxCuskTwdllQ6KULSbCY3SKOCD0VFYIqQ==\n-----END CERTIFICATE-----\n" tls_cert_hash:"o\3350\243\211\340\321\020so\247b\362\033\352\004\0071\321\002\217\273\202\252Cg\212\233\322\220m^" from 172.18.0.8:37618
[91d 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[91e 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[91f 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[920 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[921 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[922 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[923 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[924 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[925 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[926 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[927 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[928 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 de 4a 51 e9 bc de 50 f6 fa c0 37 5e a6 ad f2 |..JQ...P...7^...|
00000010 cc 1a 7d 8f b0 fc 1c d6 5b b3 db 0f 40 60 ef 6f |..}.....[...@`.o|
[929 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 76 b2 79 05 15 44 6d 6c 28 f9 5d |0D. Ov.y..Dml(.]|
00000010 6d c7 2a b2 56 ac 2c ba d9 39 2e 28 19 63 56 18 |m.*.V.,..9.(.cV.|
00000020 b6 05 69 b3 02 20 19 fd f9 8c 0a b4 9b ec 63 45 |..i.. ........cE|
00000030 6a 72 e1 59 39 1c e1 f5 7f 94 e6 b0 e6 83 a9 82 |jr.Y9...........|
00000040 3f c2 0b 5c 6e 02 |?..\n.|
[92a 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[92b 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003905e60 gate 1582330430607957800 evaluation starts
[92c 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003905e60 signed by 0 principal evaluation starts (used [false])
[92d 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003905e60 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[92e 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003905e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[92f 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003905e60 principal evaluation fails
[930 02-22 00:13:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003905e60 gate 1582330430607957800 evaluation fails
[931 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[932 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[933 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[934 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 de 4a 51 e9 bc de 50 f6 fa c0 37 5e a6 ad f2 |..JQ...P...7^...|
00000010 cc 1a 7d 8f b0 fc 1c d6 5b b3 db 0f 40 60 ef 6f |..}.....[...@`.o|
[935 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 76 b2 79 05 15 44 6d 6c 28 f9 5d |0D. Ov.y..Dml(.]|
00000010 6d c7 2a b2 56 ac 2c ba d9 39 2e 28 19 63 56 18 |m.*.V.,..9.(.cV.|
00000020 b6 05 69 b3 02 20 19 fd f9 8c 0a b4 9b ec 63 45 |..i.. ........cE|
00000030 6a 72 e1 59 39 1c e1 f5 7f 94 e6 b0 e6 83 a9 82 |jr.Y9...........|
00000040 3f c2 0b 5c 6e 02 |?..\n.|
[936 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[937 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391c760 gate 1582330430612123600 evaluation starts
[938 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391c760 signed by 0 principal evaluation starts (used [false])
[939 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391c760 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[93a 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391c760 principal evaluation succeeds for identity 0
[93b 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391c760 gate 1582330430612123600 evaluation succeeds
[93c 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[93d 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[93e 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[93f 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[940 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:37618
[941 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:37618
[942 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[943 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[944 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:37614 disconnected
[945 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:37614 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=107.9696ms
[946 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[947 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[948 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[949 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:37618 disconnected
[94a 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-02-22T00:14:00.601Z grpc.peer_address=172.18.0.8:37618 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=13.2855ms
[94b 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 1955021357186077940 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 84 bytes, Signature: 0 bytes
[94c 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 1955021357186077940 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 84 bytes, Signature: 0 bytes
[94d 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94e 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94f 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[950 02-22 00:13:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 2 IDENTITY_MSG items to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[951 02-22 00:13:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to peer0.org2.example.com:7051
[952 02-22 00:13:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 2390020757498825356 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 50 bytes, Signature: 0 bytes to 1 peers
[953 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 2390020757498825356 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 50 bytes, Signature: 0 bytes
[954 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[955 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[956 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[957 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2390020757498825356, Envelope: 961 bytes, Signature: 0 bytes
[958 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[959 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[95a 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[95b 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[95c 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[95d 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[95e 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[95f 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 f1 69 72 cc c4 4e fa 5d fb 86 71 a5 f2 63 20 |b.ir..N.]..q..c |
00000010 88 dc e5 49 f6 f8 24 f1 71 4c de ff f8 d5 a3 26 |...I..$.qL.....&|
[960 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 05 52 f1 21 99 ef 66 eb 22 b7 |0E.!...R.!..f.".|
00000010 5b 7f 01 d0 9f 93 69 e2 e2 fc 6a 76 da 33 24 b6 |[.....i...jv.3$.|
00000020 49 5e d1 6c 06 02 20 14 0b 3b 7c b5 f6 1f a6 64 |I^.l.. ..;|....d|
00000030 fe a4 0f 6d 20 10 98 79 0a c0 e8 bd e4 ca d8 48 |...m ..y.......H|
00000040 33 9e 80 d4 80 23 ab |3....#.|
[961 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[962 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003942630 gate 1582330430645605700 evaluation starts
[963 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003942630 signed by 0 principal evaluation starts (used [false])
[964 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003942630 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[965 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003942630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[966 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003942630 principal evaluation fails
[967 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003942630 gate 1582330430645605700 evaluation fails
[968 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[969 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[96a 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[96b 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 f1 69 72 cc c4 4e fa 5d fb 86 71 a5 f2 63 20 |b.ir..N.]..q..c |
00000010 88 dc e5 49 f6 f8 24 f1 71 4c de ff f8 d5 a3 26 |...I..$.qL.....&|
[96c 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 05 52 f1 21 99 ef 66 eb 22 b7 |0E.!...R.!..f.".|
00000010 5b 7f 01 d0 9f 93 69 e2 e2 fc 6a 76 da 33 24 b6 |[.....i...jv.3$.|
00000020 49 5e d1 6c 06 02 20 14 0b 3b 7c b5 f6 1f a6 64 |I^.l.. ..;|....d|
00000030 fe a4 0f 6d 20 10 98 79 0a c0 e8 bd e4 ca d8 48 |...m ..y.......H|
00000040 33 9e 80 d4 80 23 ab |3....#.|
[96d 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[96e 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003942f30 gate 1582330430647886800 evaluation starts
[96f 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003942f30 signed by 0 principal evaluation starts (used [false])
[970 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003942f30 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[971 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003942f30 principal evaluation succeeds for identity 0
[972 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003942f30 gate 1582330430647886800 evaluation succeeds
[973 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[974 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[975 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[976 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[977 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[978 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[979 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2390020757498825356, Envelope: 961 bytes, Signature: 0 bytes
[97a 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[97b 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[97c 02-22 00:13:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[97d 02-22 00:13:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[97e 02-22 00:13:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 73 53 66 84 102 69 48 69 84 113 76 106 117 84 97 55 116 88 56 114 81 73 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 84 107 120 77 106 73 52 77 68 65 49 77 84 65 119 87 104 99 78 77 106 107 120 77 106 73 49 77 68 65 49 77 84 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 74 43 80 49 78 115 97 111 121 48 100 10 86 69 101 121 80 101 73 114 78 67 84 113 102 110 76 54 100 71 101 115 104 68 118 82 88 48 79 115 54 79 66 89 77 119 114 88 107 88 82 87 103 52 89 69 109 73 119 78 88 83 76 56 99 74 119 97 112 43 54 97 102 77 102 75 10 99 88 85 68 101 50 116 111 122 78 87 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 70 88 103 50 56 50 77 85 106 98 50 111 79 85 97 115 70 111 53 54 117 77 117 88 77 52 89 118 103 87 77 116 84 50 79 114 87 120 78 52 53 101 86 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 68 78 97 89 76 78 101 69 89 72 102 52 110 72 79 108 103 75 111 85 70 100 122 119 78 47 109 51 107 76 54 55 101 72 84 110 67 120 50 83 71 51 108 65 105 66 68 120 57 89 88 10 57 99 51 57 47 121 67 97 90 100 71 78 49 75 90 52 110 107 102 67 110 99 89 65 52 114 82 48 55 118 74 75 75 117 49 112 100 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]
[97f 02-22 00:13:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Added -<2D>Ϫ<10>HTŲ1<C5B2><31>D<1F>g}<7D>l1<6C><31><EFBFBD><EFBFBD>`QN to the in memory item map, total items: 3
[980 02-22 00:13:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[981 02-22 00:13:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[982 02-22 00:13:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[983 02-22 00:13:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[984 02-22 00:13:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[985 02-22 00:13:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[986 02-22 00:13:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[987 02-22 00:13:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[988 02-22 00:13:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[989 02-22 00:13:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[98a 02-22 00:13:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: ""
[98b 02-22 00:13:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme
[98c 02-22 00:13:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending update to cc: {[{peer1.org1.example.com:7051 0 <nil>}] <nil>}
[98d 02-22 00:13:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first"
[98e 02-22 00:13:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0039bf250, CONNECTING
[98f 02-22 00:13:51.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[990 02-22 00:13:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[991 02-22 00:13:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15559217441356271791 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[992 02-22 00:13:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15559217441356271791 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[993 02-22 00:13:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[994 02-22 00:13:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330429463340600 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:3 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes to 3 peers
[995 02-22 00:13:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[996 02-22 00:13:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[997 02-22 00:13:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330429463340600 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:3 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[998 02-22 00:13:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[999 02-22 00:13:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330429463340600 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:3 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[99a 02-22 00:13:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330429463340600 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:3 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[99b 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 216 bytes, Signature: 0 bytes
[99c 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[99d 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[99e 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[99f 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9a0 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9a1 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9a2 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9a3 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9a4 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[9a5 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[9a6 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[9a7 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9a8 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e7610 gate 1582330431214421800 evaluation starts
[9a9 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e7610 signed by 0 principal evaluation starts (used [false])
[9aa 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e7610 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[9ab 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e7610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[9ac 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e7610 principal evaluation fails
[9ad 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e7610 gate 1582330431214421800 evaluation fails
[9ae 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[9af 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[9b0 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9b1 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[9b2 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[9b3 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9b4 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e7f10 gate 1582330431217690500 evaluation starts
[9b5 02-22 00:13:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e7f10 signed by 0 principal evaluation starts (used [false])
[9b6 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e7f10 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[9b7 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e7f10 principal evaluation succeeds for identity 0
[9b8 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e7f10 gate 1582330431217690500 evaluation succeeds
[9b9 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9ba 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9bb 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9bc 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9bd 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9be 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9bf 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9c0 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9c1 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9c2 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[9c3 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[9c4 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[9c5 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9c6 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04ca0 gate 1582330431222030000 evaluation starts
[9c7 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04ca0 signed by 0 principal evaluation starts (used [false])
[9c8 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04ca0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[9c9 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[9ca 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04ca0 principal evaluation fails
[9cb 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04ca0 gate 1582330431222030000 evaluation fails
[9cc 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[9cd 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[9ce 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9cf 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[9d0 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[9d1 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9d2 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a055a0 gate 1582330431222571000 evaluation starts
[9d3 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a055a0 signed by 0 principal evaluation starts (used [false])
[9d4 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a055a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[9d5 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a055a0 principal evaluation succeeds for identity 0
[9d6 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a055a0 gate 1582330431222571000 evaluation succeeds
[9d7 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9d8 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9d9 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9da 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9db 02-22 00:13:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9dc 02-22 00:13:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: ""
[9dd 02-22 00:13:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme
[9de 02-22 00:13:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending update to cc: {[{peer1.org2.example.com:7051 0 <nil>}] <nil>}
[9df 02-22 00:13:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first"
[9e0 02-22 00:13:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0039bfe20, CONNECTING
[9e1 02-22 00:13:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0039bf250, READY
[9e2 02-22 00:13:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[9e3 02-22 00:13:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[9e4 02-22 00:13:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:7051
[9e5 02-22 00:13:51.25 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"g2C\276J/\372pf\335\366\027\264\203\023\251\344S\337&\265*/\336/\t\264UU{F\310" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\335}\274\246u\3009v\251\rJG\302\340\263@\370\313\341?\326!3\350\023\320{\335\206\341V" from 172.18.0.6:7051
[9e6 02-22 00:13:51.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c 98 cf f0 20 c7 d9 fd b9 ce d3 17 55 85 70 70 |,... .......U.pp|
00000010 b3 08 3a 82 2a 57 3b dc 6d e0 0c aa 7c 99 d3 24 |..:.*W;.m...|..$|
[9e7 02-22 00:13:51.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 df 66 98 39 98 79 9a 71 7a 0a |0E.!...f.9.y.qz.|
00000010 9f 58 07 29 27 db 88 5e 07 25 3a 55 dc cf a0 e1 |.X.)'..^.%:U....|
00000020 65 da 60 06 c3 02 20 2c 3c 97 9e 6f 33 e2 25 1b |e.`... ,<..o3.%.|
00000030 6d db 26 b8 2b b3 39 8a bc 37 ed 5f de b9 a6 da |m.&.+.9..7._....|
00000040 f4 90 ba 38 87 0b 4e |...8..N|
[9e8 02-22 00:13:51.25 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051
[9e9 02-22 00:13:51.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9ea 02-22 00:13:51.25 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[9eb 02-22 00:13:51.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9ec 02-22 00:13:51.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9ed 02-22 00:13:51.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9ee 02-22 00:13:51.26 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-02-22T00:13:53.259Z grpc.peer_address=172.18.0.6:54068 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=142.2µs
[9ef 02-22 00:13:51.26 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0039bfe20, READY
[9f0 02-22 00:13:51.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[9f1 02-22 00:13:51.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[9f2 02-22 00:13:51.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:7051
[9f3 02-22 00:13:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\002W@\255\334\245\001k\370D\037\350\034\344yn\266[\024\252\232\377Y]\374\025\253\032\331g\272v" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAOd+jwZ+lMdtWYI2Tl8jQJMwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkxMjI4MDA1MTAwWhcNMjkxMjI1MDA1MTAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABOB9ByTbfpki\nB9bqQUByxqxR9255RBhctc/7CB8xk33qZI0UfdhojJETzJXoAok6XzmhLhAZJ806\nI/9M5uSt4kCjTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIFXg282MUjb2oOUasFo56uMuXM4YvgWMtT2OrWxN45eVMAoGCCqGSM49\nBAMCA0cAMEQCIHK8DQzj31ot3ep6W17uvZhWoJ4Eoa2hSpdSz/PTh8FZAiBa2Fl3\nMevsRsxCuskTwdllQ6KULSbCY3SKOCD0VFYIqQ==\n-----END CERTIFICATE-----\n" tls_cert_hash:"o\3350\243\211\340\321\020so\247b\362\033\352\004\0071\321\002\217\273\202\252Cg\212\233\322\220m^" from 172.18.0.8:7051
[9f4 02-22 00:13:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9f5 02-22 00:13:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[9f6 02-22 00:13:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[9f7 02-22 00:13:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:54068
[9f8 02-22 00:13:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"g2C\276J/\372pf\335\366\027\264\203\023\251\344S\337&\265*/\336/\t\264UU{F\310" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\335}\274\246u\3009v\251\rJG\302\340\263@\370\313\341?\326!3\350\023\320{\335\206\341V" from 172.18.0.6:54068
[9f9 02-22 00:13:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9fa 02-22 00:13:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9fb 02-22 00:13:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9fc 02-22 00:13:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c 98 cf f0 20 c7 d9 fd b9 ce d3 17 55 85 70 70 |,... .......U.pp|
00000010 b3 08 3a 82 2a 57 3b dc 6d e0 0c aa 7c 99 d3 24 |..:.*W;.m...|..$|
[9fd 02-22 00:13:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 2b 35 e7 da d3 26 c0 00 33 68 b3 |0D. q+5...&..3h.|
00000010 fa 71 5a f0 06 0b 6f 0b 41 d9 4d 5c 96 13 b1 77 |.qZ...o.A.M\...w|
00000020 8a 39 e9 8c 02 20 33 57 aa 12 5e a3 b6 4f d6 80 |.9... 3W..^..O..|
00000030 13 a3 a9 9c 84 62 cb 31 44 a2 f5 0d 79 f7 6a ce |.....b.1D...y.j.|
00000040 be 37 35 57 f0 5e |.75W.^|
[9fe 02-22 00:13:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9ff 02-22 00:13:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[a00 02-22 00:13:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[a01 02-22 00:13:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:54068
[a02 02-22 00:13:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:54068
[a03 02-22 00:13:51.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[a04 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[a05 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[a06 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[a07 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[a09 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 de 4a 51 e9 bc de 50 f6 fa c0 37 5e a6 ad f2 |..JQ...P...7^...|
00000010 cc 1a 7d 8f b0 fc 1c d6 5b b3 db 0f 40 60 ef 6f |..}.....[...@`.o|
[a08 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[a0a 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 04 6a f1 99 3b 6c 32 07 40 19 0c |0D. }.j..;l2.@..|
00000010 27 e5 ad f7 80 c3 43 ad 3b 71 72 dd ba 73 c6 16 |'.....C.;qr..s..|
00000020 65 bf 5a e6 02 20 7e 99 47 2b 9a 2e 90 3a a0 60 |e.Z.. ~.G+...:.`|
00000030 e8 13 b8 ea c1 26 ea df 2f 5e 80 5d 94 88 bb b3 |.....&../^.]....|
00000040 44 8c d7 02 3d a6 |D...=.|
[a0b 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[a0c 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[a0d 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae3b70 gate 1582330431286037500 evaluation starts
[a0e 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae3b70 signed by 0 principal evaluation starts (used [false])
[a0f 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae3b70 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[a10 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae3b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[a11 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae3b70 principal evaluation fails
[a12 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae3b70 gate 1582330431286037500 evaluation fails
[a13 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[a14 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[a15 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[a16 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 de 4a 51 e9 bc de 50 f6 fa c0 37 5e a6 ad f2 |..JQ...P...7^...|
00000010 cc 1a 7d 8f b0 fc 1c d6 5b b3 db 0f 40 60 ef 6f |..}.....[...@`.o|
[a17 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 04 6a f1 99 3b 6c 32 07 40 19 0c |0D. }.j..;l2.@..|
00000010 27 e5 ad f7 80 c3 43 ad 3b 71 72 dd ba 73 c6 16 |'.....C.;qr..s..|
00000020 65 bf 5a e6 02 20 7e 99 47 2b 9a 2e 90 3a a0 60 |e.Z.. ~.G+...:.`|
00000030 e8 13 b8 ea c1 26 ea df 2f 5e 80 5d 94 88 bb b3 |.....&../^.]....|
00000040 44 8c d7 02 3d a6 |D...=.|
[a18 02-22 00:13:51.28 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[a19 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02470 gate 1582330431290161400 evaluation starts
[a1a 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02470 signed by 0 principal evaluation starts (used [false])
[a1b 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02470 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[a1c 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02470 principal evaluation succeeds for identity 0
[a1d 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02470 gate 1582330431290161400 evaluation succeeds
[a1e 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[a1f 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[a20 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[a21 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[a22 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051
[a23 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a24 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[a25 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a26 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a27 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[a28 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = grpc: the client connection is closing
[a29 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 407 bytes, Signature: 0 bytes
[a2a 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 407 bytes, Signature: 0 bytes
[a2b 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[a2c 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[a2d 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[a2f 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:54068 disconnected
[a2e 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[a31 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[a30 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:54068 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.6386ms
[a32 02-22 00:13:51.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[a33 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[a34 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[a35 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[a36 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[a37 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[a38 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[a39 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[a3a 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[a3b 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af5960 gate 1582330431304983000 evaluation starts
[a3c 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af5960 signed by 0 principal evaluation starts (used [false])
[a3d 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af5960 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[a3e 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af5960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[a3f 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af5960 principal evaluation fails
[a40 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af5960 gate 1582330431304983000 evaluation fails
[a41 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[a42 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[a43 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[a44 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[a45 02-22 00:13:51.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[a46 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[a47 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b26260 gate 1582330431310402700 evaluation starts
[a48 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b26260 signed by 0 principal evaluation starts (used [false])
[a49 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b26260 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[a4a 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b26260 principal evaluation succeeds for identity 0
[a4b 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b26260 gate 1582330431310402700 evaluation succeeds
[a4c 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[a4d 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[a4e 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[a4f 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[a50 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[a51 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[a52 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[a53 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[a54 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[a55 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[a56 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[a57 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[a58 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[a59 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b26ff0 gate 1582330431315034100 evaluation starts
[a5a 02-22 00:13:51.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b26ff0 signed by 0 principal evaluation starts (used [false])
[a5b 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b26ff0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[a5c 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b26ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[a5d 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b26ff0 principal evaluation fails
[a5e 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b26ff0 gate 1582330431315034100 evaluation fails
[a5f 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[a60 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[a61 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[a62 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[a63 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[a64 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[a65 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b278f0 gate 1582330431321351600 evaluation starts
[a66 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b278f0 signed by 0 principal evaluation starts (used [false])
[a67 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b278f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[a68 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b278f0 principal evaluation succeeds for identity 0
[a69 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b278f0 gate 1582330431321351600 evaluation succeeds
[a6a 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[a6b 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[a6c 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[a6d 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[a6e 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[a6f 02-22 00:13:51.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[a70 02-22 00:13:51.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a71 02-22 00:13:51.74 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-02-22T00:13:53.741Z grpc.peer_address=172.18.0.6:54072 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=168.8µs
[a72 02-22 00:13:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[a73 02-22 00:13:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[a74 02-22 00:13:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQQIM2ou9DqfvkKtiUOZHklTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEI9vXO2dg2ogF\n9G7NkteaJapySU671RiKcInNv3OAdIr+xsn11Wf7TM694Ow7/GWsGU71oZTZbHfw\ni5SfKlabMqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAg0y4VvcZCLdSplahOGKT05hcJiRUeoqVmEQhWb+p7yNEwCgYIKoZIzj0E\nAwIDRwAwRAIgHtaqhr9/bxigCyhuKqYqDztw3uE11quIZ7drkaY/mvQCIGVtipl+\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:54072
[a75 02-22 00:13:51.75 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"g2C\276J/\372pf\335\366\027\264\203\023\251\344S\337&\265*/\336/\t\264UU{F\310" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAL6UJxau6L+P+ZjjcRQ8/hAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkxMjI4MDA1MTAwWhcNMjkxMjI1MDA1MTAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABIt57ZsKprUf\ngQupDXqXcUNj/QolNEuRxscKeayhIlyjnmcQ/wA2ymmIlxXZjfkvNYq2LSz43Grd\nVVFaNiJbFXujTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAINMuFb3GQi3UqZWoThik9OYXCYkVHqKlZhEIVm/qe8jRMAoGCCqGSM49\nBAMCA0cAMEQCIA1SKdLR6URj5OwCzKZhR4V/TOGLsL77sYN8KeuvY1GSAiBPsdGr\n2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\335}\274\246u\3009v\251\rJG\302\340\263@\370\313\341?\326!3\350\023\320{\335\206\341V" from 172.18.0.6:54072
[a76 02-22 00:13:51.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c 98 cf f0 20 c7 d9 fd b9 ce d3 17 55 85 70 70 |,... .......U.pp|
00000010 b3 08 3a 82 2a 57 3b dc 6d e0 0c aa 7c 99 d3 24 |..:.*W;.m...|..$|
[a77 02-22 00:13:51.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 f1 70 7e d1 7d 40 e6 8e 8d f1 38 |0D. %.p~.}@....8|
00000010 27 24 72 a9 80 ed a6 ef 28 1d a5 1b 81 db 5e f6 |'$r.....(.....^.|
00000020 9d 43 34 8f 02 20 3d 37 f3 51 54 00 fc 82 df 1c |.C4.. =7.QT.....|
00000030 c3 be f4 ed 93 27 5f 24 1f ef 37 7b b8 19 97 1a |.....'_$..7{....|
00000040 8c 86 8b aa ae 58 |.....X|
[a78 02-22 00:13:51.75 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:54072
[a79 02-22 00:13:51.75 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:54072
[a7a 02-22 00:13:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[a7b 02-22 00:13:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[a7c 02-22 00:13:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[a7d 02-22 00:13:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a7e 02-22 00:13:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15439645554833767925 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[a7f 02-22 00:13:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15439645554833767925 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[a80 02-22 00:13:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[a81 02-22 00:13:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a82 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330429544519800 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:3 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 71 bytes
[a83 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[a84 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[a85 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[a86 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[a87 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[a88 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[a89 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[a8a 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[a8b 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICKDCCAc+gAwIBAgIRAL6UJxau6L+P+ZjjcRQ8/hAwCgYIKoZIzj0EAwIwczEL
MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG
cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh
Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkxMjI4MDA1MTAwWhcNMjkxMjI1MDA1MTAw
WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN
U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn
MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABIt57ZsKprUf
gQupDXqXcUNj/QolNEuRxscKeayhIlyjnmcQ/wA2ymmIlxXZjfkvNYq2LSz43Grd
VVFaNiJbFXujTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud
IwQkMCKAINMuFb3GQi3UqZWoThik9OYXCYkVHqKlZhEIVm/qe8jRMAoGCCqGSM49
BAMCA0cAMEQCIA1SKdLR6URj5OwCzKZhR4V/TOGLsL77sYN8KeuvY1GSAiBPsdGr
2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==
-----END CERTIFICATE-----
[a8c 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[a8d 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[a8e 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[a8f 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96590 gate 1582330431773106500 evaluation starts
[a90 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96590 signed by 0 principal evaluation starts (used [false])
[a91 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96590 processing identity 0 - &{Org1MSP 8be655ba89451b517544b2a241617d188129889401e79f0659d7ccb414b44486}
[a92 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[a93 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[a94 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[a95 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96590 principal evaluation succeeds for identity 0
[a96 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96590 gate 1582330431773106500 evaluation succeeds
[a97 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[a98 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[a99 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[a9a 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[a9b 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[a9c 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[a9d 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[a9e 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330429544519800 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:3 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 71 bytes to 2 peers
[a9f 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[aa0 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[aa1 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330429544519800 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:3 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 71 bytes
[aa2 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[aa3 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330429544519800 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:3 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 71 bytes
[aa4 02-22 00:13:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[aa5 02-22 00:13:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330429544519800 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:3 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 71 bytes
[aa6 02-22 00:13:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[aa7 02-22 00:13:51.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[aa8 02-22 00:13:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[aa9 02-22 00:13:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[aaa 02-22 00:13:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[aab 02-22 00:13:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[aac 02-22 00:13:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[aad 02-22 00:13:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[aae 02-22 00:13:52.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[aaf 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330430323348200 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:3 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 71 bytes
[ab0 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ab1 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[ab2 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[ab3 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[ab4 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[ab5 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[ab6 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[ab7 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[ab8 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[ab9 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[aba 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb55e0 gate 1582330432097077400 evaluation starts
[abb 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb55e0 signed by 0 principal evaluation starts (used [false])
[abc 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb55e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[abd 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb55e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[abe 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb55e0 principal evaluation fails
[abf 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb55e0 gate 1582330432097077400 evaluation fails
[ac0 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[ac1 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[ac2 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[ac3 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[ac4 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[ac5 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[ac6 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb5ee0 gate 1582330432097899000 evaluation starts
[ac7 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb5ee0 signed by 0 principal evaluation starts (used [false])
[ac8 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb5ee0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[ac9 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb5ee0 principal evaluation succeeds for identity 0
[aca 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb5ee0 gate 1582330432097899000 evaluation succeeds
[acb 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[acc 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[acd 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[ace 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[acf 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ad0 02-22 00:13:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ad1 02-22 00:13:53.14 UTC] [%{longpkg}] %{callpath} -> INFO [[businesschannel] Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]]]
[ad2 02-22 00:13:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:3181343477793680737 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[ad3 02-22 00:13:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:3181343477793680737 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[ad4 02-22 00:13:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[ad5 02-22 00:13:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ad6 02-22 00:13:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[ad7 02-22 00:13:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ad8 02-22 00:13:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[ad9 02-22 00:13:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[ada 02-22 00:13:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 ef fb 13 07 12 89 e0 d1 8c 23 da 51 28 5b 72 |..........#.Q([r|
00000010 2b 82 9d 46 9a a4 66 a7 ce 81 47 af eb 79 f2 fe |+..F..f...G..y..|
[adb 02-22 00:13:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 43 03 34 b9 e0 d6 fd 9a b0 2f 9f |0D. oC.4....../.|
00000010 e7 8f fd 06 1b 08 60 52 af bf e0 1c 33 0a 5a 0e |......`R....3.Z.|
00000020 20 d8 e5 66 02 20 4c c3 a3 df cf 80 54 25 8e eb | ..f. L.....T%..|
00000030 9d 37 96 83 fc 2c 98 f5 9f b6 d2 47 af 86 60 3f |.7...,.....G..`?|
00000040 3d 41 1e bb 7a fb |=A..z.|
[adc 02-22 00:13:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[add 02-22 00:13:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 44 84 a4 a6 ec 63 dd 68 bb 4b 2c |0D. .D....c.h.K,|
00000010 93 f5 8d 8d c5 d2 35 7d 85 bf fb 8a 35 19 2b 35 |......5}....5.+5|
00000020 fd 32 4a 70 02 20 61 24 ba 3a e2 66 5b f5 db c5 |.2Jp. a$.:.f[...|
00000030 f6 b7 6f 37 55 fe a1 c7 5d 17 5d 70 ee 3c 0f fe |..o7U...].]p.<..|
00000040 3c 84 92 cd 33 51 |<...3Q|
[ade 02-22 00:13:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[adf 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[ae0 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:22
[ae1 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:22
[ae2 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[ae3 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ae4 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ae5 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ae6 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[ae7 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ae8 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ae9 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[aea 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[aeb 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[aec 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[aed 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[aee 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[aef 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[af0 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[af1 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 d2 a9 00 7e 63 95 08 b5 d6 e3 09 c3 f1 77 2c |a...~c........w,|
00000010 88 7e b2 52 5e b1 4e b6 70 04 30 76 1f 7d e1 44 |.~.R^.N.p.0v.}.D|
[af2 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 01 8d 05 d2 72 92 c2 dd 2f 4a |0E.!......r.../J|
00000010 fa 8c ff 51 9b 95 09 cc ac 7d 6f d3 e9 87 c9 94 |...Q.....}o.....|
00000020 3d 7e a1 9c 0c 02 20 4e 63 4d bf 57 52 57 10 ad |=~.... NcM.WRW..|
00000030 b8 d7 e7 40 75 c8 eb 64 f2 71 aa c5 6b a7 d9 2b |...@u..d.q..k..+|
00000040 18 98 8f bd a8 b5 74 |......t|
[af3 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[af4 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 1a fb 75 2d 38 2b 84 11 4e f9 |0E.!....u-8+..N.|
00000010 18 30 dd f5 f1 9b 2e 7b 85 9c 0e 82 e0 d8 f4 5e |.0.....{.......^|
00000020 7f 98 6d 85 b6 02 20 4d cf 2c 89 4f c2 df 78 44 |..m... M.,.O..xD|
00000030 82 4d 60 87 21 8b ff b7 4a cd 96 37 93 17 a1 34 |.M`.!...J..7...4|
00000040 7b d0 56 dc 39 18 1a |{.V.9..|
[af5 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[af6 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[af7 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:23
[af8 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:23
[af9 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[afa 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[afb 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[afc 02-22 00:13:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[afd 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[afe 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[aff 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510031801
[b00 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ADF63778260061623F008D3225DF510190879CA30455775814020C8AEE3BD625
[b01 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[b02 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b03 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b04 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b05 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b06 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[b07 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b08 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b09 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b0a 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[b0b 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b0c 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[b0d 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes
[b0e 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b0f 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151012
[b10 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 71F558C1D9C9E13A63E6EF0F327297D7295F928B3016AD7AC1CC05214E8FB9B8
[b11 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[b12 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[b13 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[b14 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes
[b15 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b16 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[b17 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b18 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[b19 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b1a 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:2611612796420478881 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[b1b 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:2611612796420478881 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[b1c 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b1d 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b1e 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b1f 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b20 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[b21 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b22 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[b23 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[b24 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b25 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[b26 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[b27 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[b28 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[b29 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[b2a 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[b2b 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b b6 a5 4a 21 09 07 2d 7d 3f 50 c5 b8 0e cb c3 |...J!..-}?P.....|
00000010 51 61 8f 08 c9 58 48 19 33 a2 af 01 77 da e0 13 |Qa...XH.3...w...|
[b2c 02-22 00:13:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 01 d0 ab 25 61 59 f7 20 c3 12 aa |0D. 7...%aY. ...|
00000010 f1 19 33 7f d3 a5 3d b5 a1 85 01 52 3a 87 ea 33 |..3...=....R:..3|
00000020 75 80 11 da 02 20 1d 7a bc 21 88 95 cc 5c 87 74 |u.... .z.!...\.t|
00000030 79 75 8e 17 34 d7 97 d5 83 03 2f 9c fe 2b 5d 75 |yu..4...../..+]u|
00000040 50 f4 55 22 22 e1 |P.U"".|
[b2d 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[b2e 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3b240 gate 1582330434331418900 evaluation starts
[b2f 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3b240 signed by 0 principal evaluation starts (used [false])
[b30 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3b240 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[b31 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3b240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[b32 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3b240 principal evaluation fails
[b33 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3b240 gate 1582330434331418900 evaluation fails
[b34 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[b35 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[b37 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[b39 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b b6 a5 4a 21 09 07 2d 7d 3f 50 c5 b8 0e cb c3 |...J!..-}?P.....|
00000010 51 61 8f 08 c9 58 48 19 33 a2 af 01 77 da e0 13 |Qa...XH.3...w...|
[b3a 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 01 d0 ab 25 61 59 f7 20 c3 12 aa |0D. 7...%aY. ...|
00000010 f1 19 33 7f d3 a5 3d b5 a1 85 01 52 3a 87 ea 33 |..3...=....R:..3|
00000020 75 80 11 da 02 20 1d 7a bc 21 88 95 cc 5c 87 74 |u.... .z.!...\.t|
00000030 79 75 8e 17 34 d7 97 d5 83 03 2f 9c fe 2b 5d 75 |yu..4...../..+]u|
00000040 50 f4 55 22 22 e1 |P.U"".|
[b3b 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[b3c 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3bb40 gate 1582330434334123500 evaluation starts
[b3d 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3bb40 signed by 0 principal evaluation starts (used [false])
[b3e 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3bb40 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[b38 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151013
[b36 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[b3f 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3bb40 principal evaluation succeeds for identity 0
[b42 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3bb40 gate 1582330434334123500 evaluation succeeds
[b43 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[b44 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[b45 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[b46 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[b47 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes
[b48 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes]}
[b49 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:19
[b4a 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:19
[b40 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 03FD2DA59BF9C157D0D384344D82030105ECA5374521573F401864876508B483
[b41 02-22 00:13:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:11948511098872838872 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[b4b 02-22 00:13:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[b4f 02-22 00:13:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b4c 02-22 00:13:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[b51 02-22 00:13:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b50 02-22 00:13:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[b52 02-22 00:13:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b53 02-22 00:13:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[b54 02-22 00:13:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b55 02-22 00:13:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b56 02-22 00:13:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[b57 02-22 00:13:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b58 02-22 00:13:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b59 02-22 00:13:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b5b 02-22 00:13:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b5c 02-22 00:13:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[b5e 02-22 00:13:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[b5f 02-22 00:13:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[b60 02-22 00:13:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b61 02-22 00:13:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[b5d 02-22 00:13:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b5a 02-22 00:13:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[b4d 02-22 00:13:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[b4e 02-22 00:13:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:11948511098872838872 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[b62 02-22 00:13:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b63 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b69 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[b68 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[b6b 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes
[b6c 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b64 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[b66 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:3534548961015279491 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[b6d 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b6e 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[b6f 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:16721940562331697783 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[b70 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:16721940562331697783 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[b71 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b67 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b6a 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[b72 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b73 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:3534548961015279491 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[b74 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b65 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[b75 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b76 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[b77 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b78 02-22 00:13:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes
[b79 02-22 00:13:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b7a 02-22 00:13:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes
[b7b 02-22 00:13:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes
[b7c 02-22 00:13:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b7d 02-22 00:13:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes
[b7e 02-22 00:13:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[b7f 02-22 00:13:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[b80 02-22 00:13:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b81 02-22 00:13:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11948511098872838872 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 85 bytes, Signature: 0 bytes
[b82 02-22 00:13:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11948511098872838872 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 85 bytes, Signature: 0 bytes
[b83 02-22 00:13:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[b84 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[b85 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes
[b86 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3534548961015279491 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 50 bytes, Signature: 0 bytes
[b87 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes
[b88 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[b89 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[b8a 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[b8b 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[b8d 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[b8e 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[b8f 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 a2 ab 4f 76 3b 78 b8 7f 48 d5 41 26 77 ec d5 |...Ov;x..H.A&w..|
00000010 8d b9 1f 46 be b7 06 04 5c ac a9 e4 3d aa 85 33 |...F....\...=..3|
[b90 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 6a e6 91 72 dc 57 be 63 a5 eb 35 |0D. zj..r.W.c..5|
00000010 a8 95 b8 0e b3 9c 6b 65 1f 7f 48 30 a5 40 b8 a1 |......ke..H0.@..|
00000020 66 d6 1c 76 02 20 7a a7 6f 0f c2 62 e1 86 65 b9 |f..v. z.o..b..e.|
00000030 f4 50 9f a5 65 31 4e 35 2f 07 1a 61 69 6d 9f 48 |.P..e1N5/..aim.H|
00000040 01 0d b9 7b 4d 07 |...{M.|
[b91 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[b92 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca0350 gate 1582330434437930100 evaluation starts
[b93 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca0350 signed by 0 principal evaluation starts (used [false])
[b94 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca0350 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[b95 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca0350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[b96 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca0350 principal evaluation fails
[b97 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca0350 gate 1582330434437930100 evaluation fails
[b98 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[b99 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[b9a 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[b9b 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 a2 ab 4f 76 3b 78 b8 7f 48 d5 41 26 77 ec d5 |...Ov;x..H.A&w..|
00000010 8d b9 1f 46 be b7 06 04 5c ac a9 e4 3d aa 85 33 |...F....\...=..3|
[b9c 02-22 00:13:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 6a e6 91 72 dc 57 be 63 a5 eb 35 |0D. zj..r.W.c..5|
00000010 a8 95 b8 0e b3 9c 6b 65 1f 7f 48 30 a5 40 b8 a1 |......ke..H0.@..|
00000020 66 d6 1c 76 02 20 7a a7 6f 0f c2 62 e1 86 65 b9 |f..v. z.o..b..e.|
00000030 f4 50 9f a5 65 31 4e 35 2f 07 1a 61 69 6d 9f 48 |.P..e1N5/..aim.H|
00000040 01 0d b9 7b 4d 07 |...{M.|
[b9d 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[b8c 02-22 00:13:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[b9e 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca0c50 gate 1582330434440316800 evaluation starts
[b9f 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca0c50 signed by 0 principal evaluation starts (used [false])
[ba1 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca0c50 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[ba2 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca0c50 principal evaluation succeeds for identity 0
[ba3 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca0c50 gate 1582330434440316800 evaluation succeeds
[ba4 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[ba5 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[ba6 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[ba7 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[ba8 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes
[ba9 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes]}
[baa 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:20
[bab 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:20
[bac 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[bad 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bae 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[baf 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bb0 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[bb1 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[bb2 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 fd 2d a5 9b f9 c1 57 d0 d3 84 34 4d 82 03 01 |..-....W...4M...|
00000010 05 ec a5 37 45 21 57 3f 40 18 64 87 65 08 b4 83 |...7E!W?@.d.e...|
[bb3 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 0c 7b 60 bc 8c 2c ec e7 6d e7 |0E.!...{`..,..m.|
00000010 86 7b d5 60 09 27 4b 73 1d 3c 39 92 5d 2d fe 22 |.{.`.'Ks.<9.]-."|
00000020 1a 91 ae 16 53 02 20 5c ad 46 73 26 50 76 50 fb |....S. \.Fs&PvP.|
00000030 27 a0 e1 21 7c e4 fa ac 2b 14 e4 e5 dd 2f d6 bb |'..!|...+..../..|
00000040 2c 52 6d bb 7e 55 ae |,Rm.~U.|
[ba0 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes
[bb4 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bb5 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[bb6 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f dd 48 6d 04 ef 95 59 45 1d d6 83 |0D. ..Hm...YE...|
00000010 48 36 91 9d 4a 9c d0 a9 ec 41 19 32 7a f9 81 29 |H6..J....A.2z..)|
00000020 6d c5 61 af 02 20 1e cd 78 f4 c6 7c 4c c6 9f ea |m.a.. ..x..|L...|
00000030 7c bd 9f 6a 4d bb 04 22 4a 33 22 37 32 dc f5 7f ||..jM.."J3"72...|
00000040 da c3 36 ce 4d be |..6.M.|
[bb7 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[bb8 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[bb9 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bba 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bbb 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bbc 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes
[bbd 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bbe 02-22 00:13:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes
[bbf 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes
[bc0 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bc1 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes
[bc2 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[bc3 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 fd 2d a5 9b f9 c1 57 d0 d3 84 34 4d 82 03 01 |..-....W...4M...|
00000010 05 ec a5 37 45 21 57 3f 40 18 64 87 65 08 b4 83 |...7E!W?@.d.e...|
[bc4 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 0c 7b 60 bc 8c 2c ec e7 6d e7 |0E.!...{`..,..m.|
00000010 86 7b d5 60 09 27 4b 73 1d 3c 39 92 5d 2d fe 22 |.{.`.'Ks.<9.]-."|
00000020 1a 91 ae 16 53 02 20 5c ad 46 73 26 50 76 50 fb |....S. \.Fs&PvP.|
00000030 27 a0 e1 21 7c e4 fa ac 2b 14 e4 e5 dd 2f d6 bb |'..!|...+..../..|
00000040 2c 52 6d bb 7e 55 ae |,Rm.~U.|
[bc5 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bc6 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes
[bc8 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes
[bc7 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3534548961015279491 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 50 bytes, Signature: 0 bytes
[bc9 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bca 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[bcb 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[bcc 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[bcd 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[bce 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3534548961015279491 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 50 bytes, Signature: 0 bytes
[bcf 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bd0 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes
[bd1 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[bd2 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[bd3 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[bd4 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[bd5 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 38 8b 64 f5 c0 12 25 e7 c5 0b 45 3e 12 a1 7d |Y8.d...%...E>..}|
00000010 15 f7 29 53 0a 45 ac 78 0a db 17 84 d4 34 34 90 |..)S.E.x.....44.|
[bd6 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 50 f7 87 61 d6 1f 15 0b a8 14 1f |0D. EP..a.......|
00000010 aa 5a bf fd 64 c7 1f 69 43 14 58 6e 54 63 87 a9 |.Z..d..iC.XnTc..|
00000020 e9 8e bb 9c 02 20 7f 02 5a 42 38 7a 3c cd c5 69 |..... ..ZB8z<..i|
00000030 a6 b4 63 9b 46 93 1a 03 53 54 92 03 c0 9c c0 db |..c.F...ST......|
00000040 cc 71 59 1b 16 7d |.qY..}|
[bd7 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[bd8 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd4b00 gate 1582330434456751300 evaluation starts
[bd9 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd4b00 signed by 0 principal evaluation starts (used [false])
[bda 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd4b00 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[bdb 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd4b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[bdc 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd4b00 principal evaluation fails
[bdd 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd4b00 gate 1582330434456751300 evaluation fails
[bde 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[bdf 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[be0 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[be1 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 38 8b 64 f5 c0 12 25 e7 c5 0b 45 3e 12 a1 7d |Y8.d...%...E>..}|
00000010 15 f7 29 53 0a 45 ac 78 0a db 17 84 d4 34 34 90 |..)S.E.x.....44.|
[be3 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 50 f7 87 61 d6 1f 15 0b a8 14 1f |0D. EP..a.......|
00000010 aa 5a bf fd 64 c7 1f 69 43 14 58 6e 54 63 87 a9 |.Z..d..iC.XnTc..|
00000020 e9 8e bb 9c 02 20 7f 02 5a 42 38 7a 3c cd c5 69 |..... ..ZB8z<..i|
00000030 a6 b4 63 9b 46 93 1a 03 53 54 92 03 c0 9c c0 db |..c.F...ST......|
00000040 cc 71 59 1b 16 7d |.qY..}|
[be4 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[be5 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd5400 gate 1582330434460024900 evaluation starts
[be6 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd5400 signed by 0 principal evaluation starts (used [false])
[be7 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd5400 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[be8 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd5400 principal evaluation succeeds for identity 0
[be9 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd5400 gate 1582330434460024900 evaluation succeeds
[bea 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[beb 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[bec 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[bed 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[bee 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes
[bef 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes]}
[bf0 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:21
[bf1 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:21
[be2 02-22 00:13:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[bf2 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[bf4 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bf5 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bf6 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bf7 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes
[bf8 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bf9 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bfa 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes
[bfb 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[bfc 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes
[bfd 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[bfe 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[bf3 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[bff 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c00 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c01 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c02 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c03 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c04 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[c05 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c06 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[c07 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[c08 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes
[c09 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c0a 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[c0b 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[c0c 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[c0d 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[c0f 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[c10 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 38 8b 64 f5 c0 12 25 e7 c5 0b 45 3e 12 a1 7d |Y8.d...%...E>..}|
00000010 15 f7 29 53 0a 45 ac 78 0a db 17 84 d4 34 34 90 |..)S.E.x.....44.|
[c11 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 50 f7 87 61 d6 1f 15 0b a8 14 1f |0D. EP..a.......|
00000010 aa 5a bf fd 64 c7 1f 69 43 14 58 6e 54 63 87 a9 |.Z..d..iC.XnTc..|
00000020 e9 8e bb 9c 02 20 7f 02 5a 42 38 7a 3c cd c5 69 |..... ..ZB8z<..i|
00000030 a6 b4 63 9b 46 93 1a 03 53 54 92 03 c0 9c c0 db |..c.F...ST......|
00000040 cc 71 59 1b 16 7d |.qY..}|
[c12 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[c13 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7cc0 gate 1582330434470699700 evaluation starts
[c14 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7cc0 signed by 0 principal evaluation starts (used [false])
[c15 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7cc0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[c16 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[c17 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7cc0 principal evaluation fails
[c18 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7cc0 gate 1582330434470699700 evaluation fails
[c19 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[c1a 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[c1b 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[c1c 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 38 8b 64 f5 c0 12 25 e7 c5 0b 45 3e 12 a1 7d |Y8.d...%...E>..}|
00000010 15 f7 29 53 0a 45 ac 78 0a db 17 84 d4 34 34 90 |..)S.E.x.....44.|
[c1d 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 50 f7 87 61 d6 1f 15 0b a8 14 1f |0D. EP..a.......|
00000010 aa 5a bf fd 64 c7 1f 69 43 14 58 6e 54 63 87 a9 |.Z..d..iC.XnTc..|
00000020 e9 8e bb 9c 02 20 7f 02 5a 42 38 7a 3c cd c5 69 |..... ..ZB8z<..i|
00000030 a6 b4 63 9b 46 93 1a 03 53 54 92 03 c0 9c c0 db |..c.F...ST......|
00000040 cc 71 59 1b 16 7d |.qY..}|
[c1e 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[c1f 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0e5c0 gate 1582330434471625400 evaluation starts
[c20 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0e5c0 signed by 0 principal evaluation starts (used [false])
[c21 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0e5c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[c22 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0e5c0 principal evaluation succeeds for identity 0
[c23 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0e5c0 gate 1582330434471625400 evaluation succeeds
[c24 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[c25 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[c26 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[c27 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[c28 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes
[c29 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c2a 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c0e 02-22 00:13:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes
[c2b 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c2c 02-22 00:13:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c2d 02-22 00:13:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c2e 02-22 00:13:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c2f 02-22 00:13:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c30 02-22 00:13:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c31 02-22 00:13:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c32 02-22 00:13:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[c33 02-22 00:13:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c34 02-22 00:13:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c35 02-22 00:13:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[c36 02-22 00:13:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes
[c37 02-22 00:13:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c38 02-22 00:13:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes
[c39 02-22 00:13:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c3a 02-22 00:13:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16721940562331697783 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 119 bytes, Signature: 0 bytes
[c3b 02-22 00:13:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16721940562331697783 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 119 bytes, Signature: 0 bytes
[c3c 02-22 00:13:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c3d 02-22 00:13:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[c3e 02-22 00:13:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c3f 02-22 00:13:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[c40 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[c41 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c42 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[c43 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[c44 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[c45 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[c46 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[c47 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[c48 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 77 1a db 43 80 73 a0 ab 3c f2 88 1a 3b 30 ca |uw..C.s..<...;0.|
00000010 ef 00 c5 f3 bf 22 cb 2f b9 9a eb f0 55 39 73 2d |....."./....U9s-|
[c49 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 21 46 d6 ae 20 8e a9 1b cf 76 |0E.!..!F.. ....v|
00000010 92 ea b6 81 eb 92 0f c0 91 ae 8a 41 82 50 1a 96 |...........A.P..|
00000020 99 b6 78 52 c0 02 20 17 98 02 b7 1f 61 8d f6 b5 |..xR.. .....a...|
00000030 ee db e5 f5 b7 3b 91 d5 a6 db f3 7d 8b 32 8f ef |.....;.....}.2..|
00000040 01 eb 0a ec 14 76 a4 |.....v.|
[c4a 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[c4b 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0b580 gate 1582330434536210000 evaluation starts
[c4c 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0b580 signed by 0 principal evaluation starts (used [false])
[c4d 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0b580 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[c4e 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0b580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[c4f 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0b580 principal evaluation fails
[c50 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0b580 gate 1582330434536210000 evaluation fails
[c51 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[c52 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[c53 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[c54 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 77 1a db 43 80 73 a0 ab 3c f2 88 1a 3b 30 ca |uw..C.s..<...;0.|
00000010 ef 00 c5 f3 bf 22 cb 2f b9 9a eb f0 55 39 73 2d |....."./....U9s-|
[c55 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 21 46 d6 ae 20 8e a9 1b cf 76 |0E.!..!F.. ....v|
00000010 92 ea b6 81 eb 92 0f c0 91 ae 8a 41 82 50 1a 96 |...........A.P..|
00000020 99 b6 78 52 c0 02 20 17 98 02 b7 1f 61 8d f6 b5 |..xR.. .....a...|
00000030 ee db e5 f5 b7 3b 91 d5 a6 db f3 7d 8b 32 8f ef |.....;.....}.2..|
00000040 01 eb 0a ec 14 76 a4 |.....v.|
[c56 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[c57 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0be80 gate 1582330434537332600 evaluation starts
[c58 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0be80 signed by 0 principal evaluation starts (used [false])
[c59 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0be80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[c5a 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0be80 principal evaluation succeeds for identity 0
[c5b 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0be80 gate 1582330434537332600 evaluation succeeds
[c5c 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[c5d 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[c5e 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[c5f 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[c60 02-22 00:13:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[c61 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes]}
[c62 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:22
[c63 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes
[c64 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:22
[c65 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[c66 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c67 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c68 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[c69 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 fd 2d a5 9b f9 c1 57 d0 d3 84 34 4d 82 03 01 |..-....W...4M...|
00000010 05 ec a5 37 45 21 57 3f 40 18 64 87 65 08 b4 83 |...7E!W?@.d.e...|
[c6a 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 0c 7b 60 bc 8c 2c ec e7 6d e7 |0E.!...{`..,..m.|
00000010 86 7b d5 60 09 27 4b 73 1d 3c 39 92 5d 2d fe 22 |.{.`.'Ks.<9.]-."|
00000020 1a 91 ae 16 53 02 20 5c ad 46 73 26 50 76 50 fb |....S. \.Fs&PvP.|
00000030 27 a0 e1 21 7c e4 fa ac 2b 14 e4 e5 dd 2f d6 bb |'..!|...+..../..|
00000040 2c 52 6d bb 7e 55 ae |,Rm.~U.|
[c6b 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes
[c6c 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes
[c6d 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c6e 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c6f 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes
[c70 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[c72 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 71 f5 58 c1 d9 c9 e1 3a 63 e6 ef 0f 32 72 97 d7 |q.X....:c...2r..|
00000010 29 5f 92 8b 30 16 ad 7a c1 cc 05 21 4e 8f b9 b8 |)_..0..z...!N...|
[c71 02-22 00:13:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c73 02-22 00:13:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc d1 43 96 98 c5 10 12 27 c8 10 |0E.!...C.....'..|
00000010 cb 48 42 61 09 11 16 21 1b 3f 00 46 d0 16 45 78 |.HBa...!.?.F..Ex|
00000020 0d 12 96 1d 25 02 20 62 cc db cd 03 d1 0b a6 42 |....%. b.......B|
00000030 e6 d5 18 74 a8 5f 6a da bc 75 ff 3f 65 b4 11 b2 |...t._j..u.?e...|
00000040 e5 98 c4 2a ab 57 c2 |...*.W.|
[c74 02-22 00:13:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:18 , Envelope: 83 bytes, Signature: 71 bytes
[c75 02-22 00:13:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c76 02-22 00:13:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c77 02-22 00:13:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c78 02-22 00:13:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[c79 02-22 00:13:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[c7a 02-22 00:13:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c7b 02-22 00:13:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[c7d 02-22 00:13:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c7c 02-22 00:13:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[c7e 02-22 00:13:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[c7f 02-22 00:13:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[c80 02-22 00:13:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c81 02-22 00:13:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c82 02-22 00:13:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[c83 02-22 00:13:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[c84 02-22 00:13:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[c85 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[c86 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[c87 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[c88 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[c89 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[c8a 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[c8b 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[c8c 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d76180 gate 1582330435151342700 evaluation starts
[c8d 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d76180 signed by 0 principal evaluation starts (used [false])
[c8e 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d76180 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[c8f 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d76180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[c90 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d76180 principal evaluation fails
[c91 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d76180 gate 1582330435151342700 evaluation fails
[c92 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[c93 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[c94 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[c95 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[c96 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[c97 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[c98 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d76a80 gate 1582330435152519100 evaluation starts
[c99 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d76a80 signed by 0 principal evaluation starts (used [false])
[c9a 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d76a80 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[c9b 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d76a80 principal evaluation succeeds for identity 0
[c9c 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d76a80 gate 1582330435152519100 evaluation succeeds
[c9d 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[c9e 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[c9f 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[ca0 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[ca1 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[ca2 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[ca3 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[ca4 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[ca5 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 600 bytes, Signature: 0 bytes
[ca6 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ca7 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ca8 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[ca9 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[caa 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[cab 02-22 00:13:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[cac 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[cad 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[cae 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[caf 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[cb0 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[cb1 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d93240 gate 1582330435162510000 evaluation starts
[cb2 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d93240 signed by 0 principal evaluation starts (used [false])
[cb3 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d93240 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[cb4 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d93240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[cb5 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d93240 principal evaluation fails
[cb6 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d93240 gate 1582330435162510000 evaluation fails
[cb7 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[cb8 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[cb9 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[cba 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[cbb 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[cbc 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[cbd 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d93b40 gate 1582330435166083800 evaluation starts
[cbe 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d93b40 signed by 0 principal evaluation starts (used [false])
[cbf 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d93b40 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[cc0 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d93b40 principal evaluation succeeds for identity 0
[cc1 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d93b40 gate 1582330435166083800 evaluation succeeds
[cc2 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[cc3 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[cc4 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[cc5 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[cc6 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[cc7 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 600 bytes, Signature: 0 bytes
[cc8 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[cc9 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[cca 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ccb 02-22 00:13:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[ccc 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[ccd 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[cce 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[ccf 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[cd0 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[cd1 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[cd2 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[cd3 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[cd4 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dab850 gate 1582330435171226300 evaluation starts
[cd5 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dab850 signed by 0 principal evaluation starts (used [false])
[cd6 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dab850 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[cd7 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dab850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[cd8 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dab850 principal evaluation fails
[cd9 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dab850 gate 1582330435171226300 evaluation fails
[cda 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[cdb 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[cdc 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[cdd 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[cde 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[cdf 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[ce0 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc0150 gate 1582330435175485800 evaluation starts
[ce1 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc0150 signed by 0 principal evaluation starts (used [false])
[ce2 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc0150 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[ce3 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc0150 principal evaluation succeeds for identity 0
[ce4 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc0150 gate 1582330435175485800 evaluation succeeds
[ce5 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[ce6 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[ce7 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[ce8 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[cea 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ceb 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[ce9 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[cec 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ced 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[cef 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6904712027875127425 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[cf0 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6904712027875127425 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[cee 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[cf2 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[cf1 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[cf3 02-22 00:13:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[cf4 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[cf5 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[cf6 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[cf7 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[cf8 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[cf9 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[cfa 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[cfb 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[cfc 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[cfd 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[cfe 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65ed0 gate 1582330435183822400 evaluation starts
[cff 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65ed0 signed by 0 principal evaluation starts (used [false])
[d00 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65ed0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[d01 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[d02 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65ed0 principal evaluation fails
[d03 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65ed0 gate 1582330435183822400 evaluation fails
[d04 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[d05 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[d06 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[d07 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[d08 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[d09 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[d0a 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de87d0 gate 1582330435186063100 evaluation starts
[d0b 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de87d0 signed by 0 principal evaluation starts (used [false])
[d0c 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de87d0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[d0d 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de87d0 principal evaluation succeeds for identity 0
[d0e 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de87d0 gate 1582330435186063100 evaluation succeeds
[d0f 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[d10 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[d11 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[d12 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[d13 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d14 02-22 00:13:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 601 bytes, Signature: 0 bytes
[d15 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[d16 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[d17 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[d18 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[d19 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d1a 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d1b 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[d1c 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[d1d 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[d1e 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[d1f 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[d20 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[d21 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[d22 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[d23 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[d24 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e01170 gate 1582330435195694700 evaluation starts
[d25 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e01170 signed by 0 principal evaluation starts (used [false])
[d26 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e01170 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[d27 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e01170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[d28 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e01170 principal evaluation fails
[d29 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e01170 gate 1582330435195694700 evaluation fails
[d2a 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[d2b 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[d2c 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[d2d 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[d2e 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[d2f 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[d30 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e01a70 gate 1582330435196300000 evaluation starts
[d31 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e01a70 signed by 0 principal evaluation starts (used [false])
[d32 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e01a70 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[d33 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e01a70 principal evaluation succeeds for identity 0
[d34 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e01a70 gate 1582330435196300000 evaluation succeeds
[d35 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[d36 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[d37 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[d38 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[d39 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d3a 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6904712027875127425 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[d3b 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6904712027875127425 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[d3c 02-22 00:13:55.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d3d 02-22 00:13:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 3181343477793680737 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 50 bytes, Signature: 0 bytes
[d3e 02-22 00:13:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 3181343477793680737 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 50 bytes, Signature: 0 bytes
[d3f 02-22 00:13:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d40 02-22 00:13:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[d41 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to peer1.org2.example.com:7051
[d42 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 3534548961015279491 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 50 bytes, Signature: 0 bytes to 1 peers
[d43 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 3534548961015279491 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 50 bytes, Signature: 0 bytes
[d44 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d45 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 3534548961015279491, Envelope: 961 bytes, Signature: 0 bytes
[d46 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 3534548961015279491, Envelope: 961 bytes, Signature: 0 bytes
[d47 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d48 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[d49 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[d4a 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[d4b 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[d4c 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[d4d 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[d4e 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 86 26 72 38 34 7f b0 18 17 09 f1 dd 76 cc 0b |T.&r84.......v..|
00000010 92 35 bc 89 79 3d e2 ef be 13 99 2b 29 62 7d 07 |.5..y=.....+)b}.|
[d4f 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd 94 51 ab 3a 43 f7 58 02 e0 7c |0E.!...Q.:C.X..||
00000010 64 74 2d 7d 83 24 69 af 46 c8 60 49 88 49 38 4f |dt-}.$i.F.`I.I8O|
00000020 dc a9 14 25 c2 02 20 43 07 a8 d0 fb 48 00 9d bc |...%.. C....H...|
00000030 ac c3 d6 ee 97 9d 38 9a 7e 0f a1 16 bf 41 16 22 |......8.~....A."|
00000040 0f 24 e8 75 70 93 34 |.$.up.4|
[d50 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[d51 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24950 gate 1582330435375642100 evaluation starts
[d52 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24950 signed by 0 principal evaluation starts (used [false])
[d53 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24950 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[d54 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[d55 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24950 principal evaluation fails
[d56 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24950 gate 1582330435375642100 evaluation fails
[d57 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[d58 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[d59 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[d5a 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 86 26 72 38 34 7f b0 18 17 09 f1 dd 76 cc 0b |T.&r84.......v..|
00000010 92 35 bc 89 79 3d e2 ef be 13 99 2b 29 62 7d 07 |.5..y=.....+)b}.|
[d5b 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd 94 51 ab 3a 43 f7 58 02 e0 7c |0E.!...Q.:C.X..||
00000010 64 74 2d 7d 83 24 69 af 46 c8 60 49 88 49 38 4f |dt-}.$i.F.`I.I8O|
00000020 dc a9 14 25 c2 02 20 43 07 a8 d0 fb 48 00 9d bc |...%.. C....H...|
00000030 ac c3 d6 ee 97 9d 38 9a 7e 0f a1 16 bf 41 16 22 |......8.~....A."|
00000040 0f 24 e8 75 70 93 34 |.$.up.4|
[d5c 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[d5d 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e25250 gate 1582330435377731800 evaluation starts
[d5e 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e25250 signed by 0 principal evaluation starts (used [false])
[d5f 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e25250 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[d60 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e25250 principal evaluation succeeds for identity 0
[d61 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e25250 gate 1582330435377731800 evaluation succeeds
[d62 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[d63 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[d64 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[d65 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[d66 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d67 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[d68 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 3534548961015279491, Envelope: 961 bytes, Signature: 0 bytes
[d69 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d6a 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[d6b 02-22 00:13:55.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d6c 02-22 00:13:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[d6d 02-22 00:13:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 79 100 43 106 119 90 43 108 77 100 116 87 89 73 50 84 108 56 106 81 74 77 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 84 107 120 77 106 73 52 77 68 65 49 77 84 65 119 87 104 99 78 77 106 107 120 77 106 73 49 77 68 65 49 77 84 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 69 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 79 66 57 66 121 84 98 102 112 107 105 10 66 57 98 113 81 85 66 121 120 113 120 82 57 50 53 53 82 66 104 99 116 99 47 55 67 66 56 120 107 51 51 113 90 73 48 85 102 100 104 111 106 74 69 84 122 74 88 111 65 111 107 54 88 122 109 104 76 104 65 90 74 56 48 54 10 73 47 57 77 53 117 83 116 52 107 67 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 70 88 103 50 56 50 77 85 106 98 50 111 79 85 97 115 70 111 53 54 117 77 117 88 77 52 89 118 103 87 77 116 84 50 79 114 87 120 78 52 53 101 86 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 72 75 56 68 81 122 106 51 49 111 116 51 101 112 54 87 49 55 117 118 90 104 87 111 74 52 69 111 97 50 104 83 112 100 83 122 47 80 84 104 56 70 90 65 105 66 97 50 70 108 51 10 77 101 118 115 82 115 120 67 117 115 107 84 119 100 108 108 81 54 75 85 76 83 98 67 89 51 83 75 79 67 68 48 86 70 89 73 113 81 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]
[d6e 02-22 00:13:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Added W@<40>ܥk<>D<1F><1C>yn<79>[<14><><EFBFBD>Y]<5D><15><1A>g<EFBFBD>v to the in memory item map, total items: 4
[d6f 02-22 00:13:55.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d70 02-22 00:13:55.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[d71 02-22 00:13:55.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d72 02-22 00:13:55.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d73 02-22 00:13:55.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d74 02-22 00:13:55.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6714030338612585071 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[d75 02-22 00:13:55.72 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6714030338612585071 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[d76 02-22 00:13:55.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[d77 02-22 00:13:55.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d78 02-22 00:13:56.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[d79 02-22 00:13:56.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d7a 02-22 00:13:56.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d7b 02-22 00:13:56.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d7c 02-22 00:13:56.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d7d 02-22 00:13:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[d7e 02-22 00:13:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[d7f 02-22 00:13:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d80 02-22 00:13:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d81 02-22 00:13:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d82 02-22 00:13:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d83 02-22 00:13:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:44830
[d84 02-22 00:13:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel= txID=c0784732 mspID=Org1MSP
[d85 02-22 00:13:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb a0 20 d5 5b b5 8a c5 a5 7b df 33 d0 69 41 92 |.. .[....{.3.iA.|
00000010 aa 25 9c 24 c1 0b 3a 10 ea 11 df ab 93 41 74 77 |.%.$..:......Atw|
[d86 02-22 00:13:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 df 2b d3 bc 62 cb 44 c3 04 80 03 |0E.!..+..b.D....|
00000010 a7 c5 42 2d e6 bd 83 68 13 66 24 09 c1 a6 da 68 |..B-...h.f$....h|
00000020 6e fe 7e d9 7f 02 20 12 47 d7 6c 40 59 f9 b6 ef |n.~... .G.l@Y...|
00000030 c8 fb 35 70 73 14 34 33 ac 63 aa af bb 09 da e3 |..5ps.43.c......|
00000040 1b fa 9b 6c 26 7e be |...l&~.|
[d87 02-22 00:13:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel= txID=c0784732 mspID=Org1MSP
[d88 02-22 00:13:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU [c0784732] getting chaincode data for _lifecycle on channel
[d89 02-22 00:13:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[d8a 02-22 00:13:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb a0 20 d5 5b b5 8a c5 a5 7b df 33 d0 69 41 92 |.. .[....{.3.iA.|
00000010 aa 25 9c 24 c1 0b 3a 10 ea 11 df ab 93 41 74 77 |.%.$..:......Atw|
[d8b 02-22 00:13:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 df 2b d3 bc 62 cb 44 c3 04 80 03 |0E.!..+..b.D....|
00000010 a7 c5 42 2d e6 bd 83 68 13 66 24 09 c1 a6 da 68 |..B-...h.f$....h|
00000020 6e fe 7e d9 7f 02 20 12 47 d7 6c 40 59 f9 b6 ef |n.~... .G.l@Y...|
00000030 c8 fb 35 70 73 14 34 33 ac 63 aa af bb 09 da e3 |..5ps.43.c......|
00000040 1b fa 9b 6c 26 7e be |...l&~.|
[d8c 02-22 00:13:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU received invocation of InstallChaincode for install package 1f8b08000000000000ffecf665505cd1f72e08e3102010dcdd5d82042710dcdddddd5d...
[d8d 02-22 00:13:56.77 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar
[d8e 02-22 00:13:56.79 UTC] [%{longpkg}] %{callpath} -> DEBU
FROM hyperledger/fabric-baseos:2.0
ADD binpackage.tar /usr/local/bin
LABEL org.hyperledger.fabric.chaincode.type="GOLANG" \
org.hyperledger.fabric.version="2.0.0"
ENV CORE_CHAINCODE_BUILDLEVEL=2.0.0
[d8f 02-22 00:13:56.79 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting build with image hyperledger/fabric-ccenv:2.0
[d90 02-22 00:13:56.80 UTC] [%{longpkg}] %{callpath} -> DEBU Image hyperledger/fabric-ccenv:2.0 does not exist locally, attempt pull
[d91 02-22 00:13:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:10333036279609773534 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[d92 02-22 00:13:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10333036279609773534 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[d93 02-22 00:13:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d94 02-22 00:13:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d95 02-22 00:13:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d96 02-22 00:13:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d97 02-22 00:13:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d98 02-22 00:13:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[d99 02-22 00:13:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[d9a 02-22 00:13:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d9b 02-22 00:13:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:11024445710880867970 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[d9c 02-22 00:13:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:11024445710880867970 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[d9d 02-22 00:13:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[d9e 02-22 00:13:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[d9f 02-22 00:13:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[da0 02-22 00:13:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[da1 02-22 00:13:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[da2 02-22 00:13:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[da3 02-22 00:13:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 84 5e 93 cb 81 f2 e1 8b 9d e8 2b 23 ee ac b6 |..^........+#...|
00000010 8c 7a a6 83 ba 93 f7 25 b4 85 ef e6 ab 4f 6d 27 |.z.....%.....Om'|
[da4 02-22 00:13:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 b4 03 d2 90 53 1a 8e f4 5f 95 c5 |0D. 0....S..._..|
00000010 2c b1 88 38 df 4b 83 0c 42 9a 8a 7c 25 37 80 8e |,..8.K..B..|%7..|
00000020 64 a3 07 43 02 20 0d 76 55 f3 a6 19 00 86 da 89 |d..C. .vU.......|
00000030 60 46 aa fe 7e b8 07 9d cc de 38 72 19 d6 b5 a2 |`F..~.....8r....|
00000040 27 70 b0 c9 ed a1 |'p....|
[da5 02-22 00:13:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[da6 02-22 00:13:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 03 69 eb 28 e6 7c 8a 95 2d 9f 80 |0D. U.i.(.|..-..|
00000010 de fc 51 c7 50 c2 4c f7 9e f2 f5 16 56 25 ad 06 |..Q.P.L.....V%..|
00000020 d2 c7 2d 61 02 20 34 4f 92 24 7d 68 91 6d 8c f4 |..-a. 4O.$}h.m..|
00000030 82 53 39 0a ea 6c 90 a8 cc b1 e6 a2 0c 19 ed e8 |.S9..l..........|
00000040 a2 9e 93 7a df b1 |...z..|
[da7 02-22 00:13:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[da8 02-22 00:13:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[da9 02-22 00:13:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:24
[daa 02-22 00:13:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:24
[dab 02-22 00:13:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[dac 02-22 00:13:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[dad 02-22 00:13:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[dae 02-22 00:13:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[daf 02-22 00:13:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[db0 02-22 00:13:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[db1 02-22 00:13:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[db3 02-22 00:13:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[db4 02-22 00:13:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[db5 02-22 00:13:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[db2 02-22 00:13:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:17404077382885313390 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[db6 02-22 00:13:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:17404077382885313390 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[db7 02-22 00:13:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:17404077382885313390 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[db8 02-22 00:13:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[db9 02-22 00:13:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[dba 02-22 00:13:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[dbb 02-22 00:13:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[dbc 02-22 00:13:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[dbd 02-22 00:13:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[dbe 02-22 00:13:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[dbf 02-22 00:13:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[dc0 02-22 00:13:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[dc1 02-22 00:13:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[dc2 02-22 00:13:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[dc3 02-22 00:13:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[dc4 02-22 00:13:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[dc5 02-22 00:13:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[dc6 02-22 00:13:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[dc7 02-22 00:13:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[dc8 02-22 00:13:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[dc9 02-22 00:13:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[dca 02-22 00:13:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[dcb 02-22 00:13:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[dcc 02-22 00:13:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[dcd 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[dce 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 8a 73 74 15 12 59 11 c4 ce 06 43 ab c6 12 23 |..st..Y....C...#|
00000010 c5 e7 ba 89 33 2a cd 8b a9 eb 69 4d 33 50 0f fb |....3*....iM3P..|
[dcf 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 b2 10 ba ab 72 af 30 f4 95 af |0E.!......r.0...|
00000010 50 82 3f 95 3d 3f 5f 5b 46 c4 85 4d 36 e2 ad c0 |P.?.=?_[F..M6...|
00000020 df b1 58 34 83 02 20 79 03 40 42 63 9a a8 48 84 |..X4.. y.@Bc..H.|
00000030 33 26 62 18 3d 03 c5 6a 44 a2 3d 7d 0a 9d 42 b7 |3&b.=..jD.=}..B.|
00000040 42 b4 b5 10 a2 f5 18 |B......|
[dd0 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[dd1 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002110a0 gate 1582330438314962700 evaluation starts
[dd2 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002110a0 signed by 0 principal evaluation starts (used [false])
[dd3 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002110a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[dd4 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002110a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[dd5 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002110a0 principal evaluation fails
[dd6 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002110a0 gate 1582330438314962700 evaluation fails
[dd7 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[dd8 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[dd9 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[dda 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 8a 73 74 15 12 59 11 c4 ce 06 43 ab c6 12 23 |..st..Y....C...#|
00000010 c5 e7 ba 89 33 2a cd 8b a9 eb 69 4d 33 50 0f fb |....3*....iM3P..|
[ddb 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 b2 10 ba ab 72 af 30 f4 95 af |0E.!......r.0...|
00000010 50 82 3f 95 3d 3f 5f 5b 46 c4 85 4d 36 e2 ad c0 |P.?.=?_[F..M6...|
00000020 df b1 58 34 83 02 20 79 03 40 42 63 9a a8 48 84 |..X4.. y.@Bc..H.|
00000030 33 26 62 18 3d 03 c5 6a 44 a2 3d 7d 0a 9d 42 b7 |3&b.=..jD.=}..B.|
00000040 42 b4 b5 10 a2 f5 18 |B......|
[ddc 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[ddd 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002119a0 gate 1582330438319273800 evaluation starts
[dde 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002119a0 signed by 0 principal evaluation starts (used [false])
[ddf 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002119a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[de0 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002119a0 principal evaluation succeeds for identity 0
[de1 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002119a0 gate 1582330438319273800 evaluation succeeds
[de2 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[de3 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[de4 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[de5 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[de6 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes
[de7 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes]}
[de8 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:23
[de9 02-22 00:13:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:23
[dea 02-22 00:13:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[deb 02-22 00:13:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[dec 02-22 00:13:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ded 02-22 00:13:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[dee 02-22 00:13:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[def 02-22 00:13:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[df0 02-22 00:13:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[df1 02-22 00:13:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[df2 02-22 00:13:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[df3 02-22 00:13:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[df4 02-22 00:13:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[df5 02-22 00:13:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[df6 02-22 00:13:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1651233388548726597 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[df7 02-22 00:13:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[df8 02-22 00:13:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7651590978800632127 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[df9 02-22 00:13:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[dfa 02-22 00:13:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13813050787646328053 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[dfb 02-22 00:13:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13813050787646328053 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[dfc 02-22 00:13:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[dfd 02-22 00:13:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1651233388548726597 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[dfe 02-22 00:13:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[dff 02-22 00:13:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7651590978800632127 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[e00 02-22 00:13:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e01 02-22 00:13:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151014
[e02 02-22 00:13:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 07E2B54D2714A37834E7083F4D1F1EDC713D78800AAC1E24549886ABA05F1516
[e03 02-22 00:13:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[e04 02-22 00:13:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[e05 02-22 00:13:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[e06 02-22 00:13:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e07 02-22 00:13:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[e08 02-22 00:13:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e09 02-22 00:13:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[e0a 02-22 00:13:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[e0b 02-22 00:13:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e0c 02-22 00:13:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[e0d 02-22 00:13:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e0e 02-22 00:13:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[e0f 02-22 00:13:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e10 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1651233388548726597 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[e11 02-22 00:13:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e12 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[e13 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e14 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7651590978800632127 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 118 bytes, Signature: 0 bytes
[e15 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7651590978800632127 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 118 bytes, Signature: 0 bytes
[e16 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e17 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1651233388548726597 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[e18 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1651233388548726597 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[e19 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e1a 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[e1b 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[e1c 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e1d 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[e1e 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[e1f 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[e20 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[e21 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[e22 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[e23 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 97 11 8c 0a 8f b0 f5 46 85 91 1c 8a 4e 0c b6 |^.......F....N..|
00000010 d2 4a 60 ca 1c 22 9a 8f 52 da 4c 9c 26 1b 1a c1 |.J`.."..R.L.&...|
[e24 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 3b e0 80 57 37 aa 83 18 ea 9b |0E.!..;..W7.....|
00000010 57 88 03 71 5a 1c 1b 39 3b ee 44 42 fb 1d 2f 57 |W..qZ..9;.DB../W|
00000020 1c 78 64 9a de 02 20 1c 5a 23 6c 58 63 1a 37 40 |.xd... .Z#lXc.7@|
00000030 f1 0a e0 14 ab 39 00 07 76 b8 c4 1a 3a 7c 75 8d |.....9..v...:|u.|
00000040 bf a0 5c 70 37 72 9a |..\p7r.|
[e25 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[e26 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000231ef0 gate 1582330438368776500 evaluation starts
[e27 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000231ef0 signed by 0 principal evaluation starts (used [false])
[e28 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000231ef0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[e29 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000231ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[e2a 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000231ef0 principal evaluation fails
[e2b 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000231ef0 gate 1582330438368776500 evaluation fails
[e2c 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[e2d 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[e2e 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[e2f 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 97 11 8c 0a 8f b0 f5 46 85 91 1c 8a 4e 0c b6 |^.......F....N..|
00000010 d2 4a 60 ca 1c 22 9a 8f 52 da 4c 9c 26 1b 1a c1 |.J`.."..R.L.&...|
[e30 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 3b e0 80 57 37 aa 83 18 ea 9b |0E.!..;..W7.....|
00000010 57 88 03 71 5a 1c 1b 39 3b ee 44 42 fb 1d 2f 57 |W..qZ..9;.DB../W|
00000020 1c 78 64 9a de 02 20 1c 5a 23 6c 58 63 1a 37 40 |.xd... .Z#lXc.7@|
00000030 f1 0a e0 14 ab 39 00 07 76 b8 c4 1a 3a 7c 75 8d |.....9..v...:|u.|
00000040 bf a0 5c 70 37 72 9a |..\p7r.|
[e31 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[e32 02-22 00:13:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e840 gate 1582330438369249100 evaluation starts
[e33 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e840 signed by 0 principal evaluation starts (used [false])
[e34 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e840 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[e35 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e840 principal evaluation succeeds for identity 0
[e36 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e840 gate 1582330438369249100 evaluation succeeds
[e37 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[e38 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[e39 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[e3a 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[e3b 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes
[e3c 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes]}
[e3d 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:21
[e3e 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:21
[e3f 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[e40 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e41 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e42 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e43 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[e45 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e46 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e47 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e48 02-22 00:13:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[e49 02-22 00:13:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[e4a 02-22 00:13:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[e4b 02-22 00:13:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e4c 02-22 00:13:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e4d 02-22 00:13:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13813050787646328053 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[e4e 02-22 00:13:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13813050787646328053 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[e4f 02-22 00:13:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e44 02-22 00:13:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[e50 02-22 00:13:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[e51 02-22 00:13:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e2 b5 4d 27 14 a3 78 34 e7 08 3f 4d 1f 1e dc |...M'..x4..?M...|
00000010 71 3d 78 80 0a ac 1e 24 54 98 86 ab a0 5f 15 16 |q=x....$T...._..|
[e52 02-22 00:13:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 ea 01 f1 57 de 31 62 f9 de 1a |0E.!.....W.1b...|
00000010 64 df 21 1c e3 fd 88 bf 1f 62 4c 32 72 9b a4 99 |d.!......bL2r...|
00000020 d6 85 34 fc c9 02 20 2f 7f d4 91 a5 b7 e6 22 77 |..4... /......"w|
00000030 fa 0f e4 b0 3c 94 98 bf 6f 4a 12 15 5a ff 41 e9 |....<...oJ..Z.A.|
00000040 70 35 8a 16 1f b8 d2 |p5.....|
[e53 02-22 00:13:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[e54 02-22 00:13:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 06 f2 4f 80 22 89 3c 1b 6e 3a |0E.!....O.".<.n:|
00000010 e8 70 c6 b0 96 b3 df b8 50 93 d7 4e 2f 75 4f a8 |.p......P..N/uO.|
00000020 9d 9b 3a 09 4d 02 20 49 0c 0b c5 06 4c 65 db 14 |..:.M. I....Le..|
00000030 a9 fe 29 f7 39 53 63 85 00 f1 93 09 bd ad 17 c5 |..).9Sc.........|
00000040 76 34 9a f4 ea d5 e4 |v4.....|
[e55 02-22 00:13:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[e56 02-22 00:13:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[e57 02-22 00:13:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e58 02-22 00:13:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e59 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[e5a 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[e5b 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e5c 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[e5d 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[e5e 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e5f 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[e60 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[e61 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[e62 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[e63 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[e64 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[e65 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 97 11 8c 0a 8f b0 f5 46 85 91 1c 8a 4e 0c b6 |^.......F....N..|
00000010 d2 4a 60 ca 1c 22 9a 8f 52 da 4c 9c 26 1b 1a c1 |.J`.."..R.L.&...|
[e66 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 3b e0 80 57 37 aa 83 18 ea 9b |0E.!..;..W7.....|
00000010 57 88 03 71 5a 1c 1b 39 3b ee 44 42 fb 1d 2f 57 |W..qZ..9;.DB../W|
00000020 1c 78 64 9a de 02 20 1c 5a 23 6c 58 63 1a 37 40 |.xd... .Z#lXc.7@|
00000030 f1 0a e0 14 ab 39 00 07 76 b8 c4 1a 3a 7c 75 8d |.....9..v...:|u.|
00000040 bf a0 5c 70 37 72 9a |..\p7r.|
[e67 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[e68 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344470 gate 1582330438394754900 evaluation starts
[e69 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344470 signed by 0 principal evaluation starts (used [false])
[e6a 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344470 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[e6b 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[e6c 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344470 principal evaluation fails
[e6d 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344470 gate 1582330438394754900 evaluation fails
[e6e 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[e6f 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[e70 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[e71 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 97 11 8c 0a 8f b0 f5 46 85 91 1c 8a 4e 0c b6 |^.......F....N..|
00000010 d2 4a 60 ca 1c 22 9a 8f 52 da 4c 9c 26 1b 1a c1 |.J`.."..R.L.&...|
[e72 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 3b e0 80 57 37 aa 83 18 ea 9b |0E.!..;..W7.....|
00000010 57 88 03 71 5a 1c 1b 39 3b ee 44 42 fb 1d 2f 57 |W..qZ..9;.DB../W|
00000020 1c 78 64 9a de 02 20 1c 5a 23 6c 58 63 1a 37 40 |.xd... .Z#lXc.7@|
00000030 f1 0a e0 14 ab 39 00 07 76 b8 c4 1a 3a 7c 75 8d |.....9..v...:|u.|
00000040 bf a0 5c 70 37 72 9a |..\p7r.|
[e73 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[e74 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344d70 gate 1582330438399730200 evaluation starts
[e75 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344d70 signed by 0 principal evaluation starts (used [false])
[e76 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344d70 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[e77 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344d70 principal evaluation succeeds for identity 0
[e78 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344d70 gate 1582330438399730200 evaluation succeeds
[e79 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[e7a 02-22 00:13:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[e7b 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[e7c 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[e7d 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes
[e7e 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e7f 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[e80 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e2 b5 4d 27 14 a3 78 34 e7 08 3f 4d 1f 1e dc |...M'..x4..?M...|
00000010 71 3d 78 80 0a ac 1e 24 54 98 86 ab a0 5f 15 16 |q=x....$T...._..|
[e81 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 ea 01 f1 57 de 31 62 f9 de 1a |0E.!.....W.1b...|
00000010 64 df 21 1c e3 fd 88 bf 1f 62 4c 32 72 9b a4 99 |d.!......bL2r...|
00000020 d6 85 34 fc c9 02 20 2f 7f d4 91 a5 b7 e6 22 77 |..4... /......"w|
00000030 fa 0f e4 b0 3c 94 98 bf 6f 4a 12 15 5a ff 41 e9 |....<...oJ..Z.A.|
00000040 70 35 8a 16 1f b8 d2 |p5.....|
[e82 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes
[e83 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes
[e84 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e85 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[e86 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 84 5e 93 cb 81 f2 e1 8b 9d e8 2b 23 ee ac b6 |..^........+#...|
00000010 8c 7a a6 83 ba 93 f7 25 b4 85 ef e6 ab 4f 6d 27 |.z.....%.....Om'|
[e87 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 b4 03 d2 90 53 1a 8e f4 5f 95 c5 |0D. 0....S..._..|
00000010 2c b1 88 38 df 4b 83 0c 42 9a 8a 7c 25 37 80 8e |,..8.K..B..|%7..|
00000020 64 a3 07 43 02 20 0d 76 55 f3 a6 19 00 86 da 89 |d..C. .vU.......|
00000030 60 46 aa fe 7e b8 07 9d cc de 38 72 19 d6 b5 a2 |`F..~.....8r....|
00000040 27 70 b0 c9 ed a1 |'p....|
[e88 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[e89 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e8a 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e8b 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[e8c 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e8d 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[e8e 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[e8f 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 84 5e 93 cb 81 f2 e1 8b 9d e8 2b 23 ee ac b6 |..^........+#...|
00000010 8c 7a a6 83 ba 93 f7 25 b4 85 ef e6 ab 4f 6d 27 |.z.....%.....Om'|
[e90 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 b4 03 d2 90 53 1a 8e f4 5f 95 c5 |0D. 0....S..._..|
00000010 2c b1 88 38 df 4b 83 0c 42 9a 8a 7c 25 37 80 8e |,..8.K..B..|%7..|
00000020 64 a3 07 43 02 20 0d 76 55 f3 a6 19 00 86 da 89 |d..C. .vU.......|
00000030 60 46 aa fe 7e b8 07 9d cc de 38 72 19 d6 b5 a2 |`F..~.....8r....|
00000040 27 70 b0 c9 ed a1 |'p....|
[e91 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[e92 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[e93 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[e94 02-22 00:13:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[e95 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[e96 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[e97 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[e98 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[e99 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[e9a 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[e9b 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 8a 73 74 15 12 59 11 c4 ce 06 43 ab c6 12 23 |..st..Y....C...#|
00000010 c5 e7 ba 89 33 2a cd 8b a9 eb 69 4d 33 50 0f fb |....3*....iM3P..|
[e9c 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 b2 10 ba ab 72 af 30 f4 95 af |0E.!......r.0...|
00000010 50 82 3f 95 3d 3f 5f 5b 46 c4 85 4d 36 e2 ad c0 |P.?.=?_[F..M6...|
00000020 df b1 58 34 83 02 20 79 03 40 42 63 9a a8 48 84 |..X4.. y.@Bc..H.|
00000030 33 26 62 18 3d 03 c5 6a 44 a2 3d 7d 0a 9d 42 b7 |3&b.=..jD.=}..B.|
00000040 42 b4 b5 10 a2 f5 18 |B......|
[e9d 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[e9e 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038cec0 gate 1582330438413213300 evaluation starts
[e9f 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038cec0 signed by 0 principal evaluation starts (used [false])
[ea0 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038cec0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[ea1 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038cec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[ea2 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038cec0 principal evaluation fails
[ea3 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038cec0 gate 1582330438413213300 evaluation fails
[ea4 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[ea5 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[ea6 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[ea7 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 8a 73 74 15 12 59 11 c4 ce 06 43 ab c6 12 23 |..st..Y....C...#|
00000010 c5 e7 ba 89 33 2a cd 8b a9 eb 69 4d 33 50 0f fb |....3*....iM3P..|
[ea8 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 b2 10 ba ab 72 af 30 f4 95 af |0E.!......r.0...|
00000010 50 82 3f 95 3d 3f 5f 5b 46 c4 85 4d 36 e2 ad c0 |P.?.=?_[F..M6...|
00000020 df b1 58 34 83 02 20 79 03 40 42 63 9a a8 48 84 |..X4.. y.@Bc..H.|
00000030 33 26 62 18 3d 03 c5 6a 44 a2 3d 7d 0a 9d 42 b7 |3&b.=..jD.=}..B.|
00000040 42 b4 b5 10 a2 f5 18 |B......|
[ea9 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[eaa 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038d7c0 gate 1582330438416010500 evaluation starts
[eab 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038d7c0 signed by 0 principal evaluation starts (used [false])
[eac 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038d7c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[ead 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038d7c0 principal evaluation succeeds for identity 0
[eae 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038d7c0 gate 1582330438416010500 evaluation succeeds
[eaf 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[eb0 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[eb1 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[eb2 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[eb3 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes
[eb4 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[eb5 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[eb6 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e2 b5 4d 27 14 a3 78 34 e7 08 3f 4d 1f 1e dc |...M'..x4..?M...|
00000010 71 3d 78 80 0a ac 1e 24 54 98 86 ab a0 5f 15 16 |q=x....$T...._..|
[eb7 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 ea 01 f1 57 de 31 62 f9 de 1a |0E.!.....W.1b...|
00000010 64 df 21 1c e3 fd 88 bf 1f 62 4c 32 72 9b a4 99 |d.!......bL2r...|
00000020 d6 85 34 fc c9 02 20 2f 7f d4 91 a5 b7 e6 22 77 |..4... /......"w|
00000030 fa 0f e4 b0 3c 94 98 bf 6f 4a 12 15 5a ff 41 e9 |....<...oJ..Z.A.|
00000040 70 35 8a 16 1f b8 d2 |p5.....|
[eb8 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes
[eb9 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes
[eba 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ebb 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ebc 02-22 00:13:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s
[ebd 02-22 00:13:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ebe 02-22 00:13:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ebf 02-22 00:13:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[ec0 02-22 00:13:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[ec1 02-22 00:13:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ec2 02-22 00:13:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[ec3 02-22 00:13:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ec4 02-22 00:13:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[ec5 02-22 00:13:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ec6 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 601 bytes, Signature: 0 bytes
[ec7 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[ec8 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[ec9 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[eca 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[ecb 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ecc 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ecd 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[ece 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[ecf 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[ed0 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[ed1 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[ed2 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[ed3 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[ed4 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[ed5 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[ed6 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d7890 gate 1582330439113269900 evaluation starts
[ed7 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d7890 signed by 0 principal evaluation starts (used [false])
[ed8 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d7890 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[ed9 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d7890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[eda 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d7890 principal evaluation fails
[edb 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d7890 gate 1582330439113269900 evaluation fails
[edc 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[edd 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[ede 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[edf 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[ee0 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[ee1 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[ee2 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c6250 gate 1582330439113796700 evaluation starts
[ee3 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c6250 signed by 0 principal evaluation starts (used [false])
[ee4 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c6250 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[ee5 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c6250 principal evaluation succeeds for identity 0
[ee6 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c6250 gate 1582330439113796700 evaluation succeeds
[ee7 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[ee8 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[ee9 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[eea 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[eeb 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[eec 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 600 bytes, Signature: 0 bytes
[eed 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 600 bytes, Signature: 0 bytes
[eee 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[eef 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ef0 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ef1 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[ef2 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[ef3 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[ef4 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[ef5 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[ef6 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[ef7 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[ef8 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[ef9 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[efa 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f0d00 gate 1582330439114994200 evaluation starts
[efb 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f0d00 signed by 0 principal evaluation starts (used [false])
[efc 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f0d00 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[efd 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f0d00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[efe 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f0d00 principal evaluation fails
[eff 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f0d00 gate 1582330439114994200 evaluation fails
[f00 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[f01 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[f02 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[f03 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[f04 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[f05 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[f06 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f16c0 gate 1582330439115815600 evaluation starts
[f07 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f16c0 signed by 0 principal evaluation starts (used [false])
[f08 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f16c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[f09 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f16c0 principal evaluation succeeds for identity 0
[f0a 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f16c0 gate 1582330439115815600 evaluation succeeds
[f0b 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[f0c 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[f0d 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[f0e 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[f0f 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[f10 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[f11 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f12 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f13 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[f14 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[f15 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[f16 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[f17 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[f18 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[f19 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[f1a 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[f1b 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[f1c 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9970 gate 1582330439117670000 evaluation starts
[f1d 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9970 signed by 0 principal evaluation starts (used [false])
[f1e 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9970 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[f1f 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[f20 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9970 principal evaluation fails
[f21 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9970 gate 1582330439117670000 evaluation fails
[f22 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[f23 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[f24 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[f25 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[f26 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[f27 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[f28 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b582c0 gate 1582330439118317500 evaluation starts
[f29 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b582c0 signed by 0 principal evaluation starts (used [false])
[f2a 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b582c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[f2b 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b582c0 principal evaluation succeeds for identity 0
[f2c 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b582c0 gate 1582330439118317500 evaluation succeeds
[f2d 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[f2e 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[f2f 02-22 00:13:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[f30 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[f31 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f32 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[f33 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f34 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f35 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f36 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[f37 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[f38 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[f39 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[f3a 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[f3b 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[f3c 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[f3d 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[f3e 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[f3f 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cac2c0 gate 1582330439124028400 evaluation starts
[f40 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cac2c0 signed by 0 principal evaluation starts (used [false])
[f41 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cac2c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[f42 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cac2c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[f43 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cac2c0 principal evaluation fails
[f44 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cac2c0 gate 1582330439124028400 evaluation fails
[f45 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[f46 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[f47 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[f48 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[f49 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[f4a 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[f4b 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cacbc0 gate 1582330439124420300 evaluation starts
[f4c 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cacbc0 signed by 0 principal evaluation starts (used [false])
[f4d 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cacbc0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[f4e 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cacbc0 principal evaluation succeeds for identity 0
[f4f 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cacbc0 gate 1582330439124420300 evaluation succeeds
[f50 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[f51 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[f52 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[f53 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[f54 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[f55 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[f56 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[f57 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[f58 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f59 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f5a 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[f5b 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[f5c 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[f5d 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[f5e 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[f5f 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[f60 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[f61 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[f62 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[f63 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc33e0 gate 1582330439125654900 evaluation starts
[f64 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc33e0 signed by 0 principal evaluation starts (used [false])
[f65 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc33e0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[f66 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc33e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[f67 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc33e0 principal evaluation fails
[f68 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc33e0 gate 1582330439125654900 evaluation fails
[f69 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[f6a 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[f6b 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[f6c 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[f6d 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[f6e 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[f6f 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3d00 gate 1582330439126047300 evaluation starts
[f70 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3d00 signed by 0 principal evaluation starts (used [false])
[f71 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3d00 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[f72 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3d00 principal evaluation succeeds for identity 0
[f73 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3d00 gate 1582330439126047300 evaluation succeeds
[f74 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[f75 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[f76 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[f77 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[f78 02-22 00:13:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f79 02-22 00:13:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f7a 02-22 00:13:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f7b 02-22 00:13:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[f7c 02-22 00:13:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f7d 02-22 00:13:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f7e 02-22 00:13:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11970121272330478451 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[f7f 02-22 00:13:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11970121272330478451 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[f80 02-22 00:13:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f81 02-22 00:13:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11970121272330478451 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[f82 02-22 00:13:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11970121272330478451 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[f83 02-22 00:13:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f84 02-22 00:13:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 11024445710880867970 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 51 bytes, Signature: 0 bytes
[f85 02-22 00:13:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 11024445710880867970 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 51 bytes, Signature: 0 bytes
[f86 02-22 00:13:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f87 02-22 00:13:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[f88 02-22 00:13:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[f89 02-22 00:13:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f8a 02-22 00:13:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[f8b 02-22 00:13:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[f8c 02-22 00:13:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ca 66 75 f9 c1 7e 77 e7 7c 4d f4 01 06 ec 60 b1 |.fu..~w.|M....`.|
00000010 31 9f b6 c5 32 13 e1 d8 29 9b a3 53 f7 24 d0 f5 |1...2...)..S.$..|
[f8d 02-22 00:13:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 0c 2d e8 77 28 af 1d 42 16 ab |0E.!...-.w(..B..|
00000010 d1 36 81 45 61 62 4d b7 5a 52 bd 7c f4 3f 8b 89 |.6.EabM.ZR.|.?..|
00000020 c8 7e 13 0d 86 02 20 1c 32 0e 18 18 c6 ec c2 69 |.~.... .2......i|
00000030 0b 36 8b 8a e1 81 7e 0a 0a d2 3a 81 25 de 58 a6 |.6....~...:.%.X.|
00000040 44 b5 ad 5b 45 4b 46 |D..[EKF|
[f8e 02-22 00:13:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[f8f 02-22 00:13:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 f9 86 d9 eb 04 72 94 ef ea f8 |0E.!.......r....|
00000010 0a 83 18 4b 1d e0 2c 94 99 fd 42 1d 04 59 65 a7 |...K..,...B..Ye.|
00000020 58 7e 28 d0 bc 02 20 4d ec b6 2f c2 cf f5 4a 15 |X~(... M../...J.|
00000030 d0 59 63 f8 94 64 c4 65 d6 98 49 e9 4c 08 f2 29 |.Yc..d.e..I.L..)|
00000040 3f 83 0e 14 2f 79 1e |?.../y.|
[f90 02-22 00:13:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[f91 02-22 00:13:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[f92 02-22 00:13:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:25
[f93 02-22 00:13:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:25
[f94 02-22 00:13:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[f95 02-22 00:13:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f96 02-22 00:13:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f97 02-22 00:13:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[f98 02-22 00:13:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[f99 02-22 00:13:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f9a 02-22 00:13:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[f9b 02-22 00:13:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[f9c 02-22 00:13:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[f9d 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[f9e 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[f9f 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[fa0 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[fa1 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[fa2 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[fa3 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[fa4 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[fa5 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 79 c3 ea aa d2 04 a8 e8 db f5 4b 6f 6c cf b9 |.y.........Kol..|
00000010 6e 4f 73 79 fd a9 e0 66 e5 a8 dc 18 ed ca 94 a4 |nOsy...f........|
[fa6 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 6e 4b 30 5f ea c4 cf 82 fd e2 |0E.!..nK0_......|
00000010 22 1f 47 b5 3e 61 19 9f 5a 6e 09 a6 59 ad 30 29 |".G.>a..Zn..Y.0)|
00000020 ec 80 f4 99 8c 02 20 61 11 ee 6e 38 33 b9 a5 20 |...... a..n83.. |
00000030 1e f4 e7 5d a8 38 7d 6d e4 61 2d 90 47 59 5a c3 |...].8}m.a-.GYZ.|
00000040 6b bd b7 0a 4c d9 a8 |k...L..|
[fa7 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[fa8 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd6100 gate 1582330439314675200 evaluation starts
[fa9 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd6100 signed by 0 principal evaluation starts (used [false])
[faa 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd6100 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[fab 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd6100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[fac 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd6100 principal evaluation fails
[fad 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd6100 gate 1582330439314675200 evaluation fails
[fae 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[faf 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[fb0 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[fb1 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 79 c3 ea aa d2 04 a8 e8 db f5 4b 6f 6c cf b9 |.y.........Kol..|
00000010 6e 4f 73 79 fd a9 e0 66 e5 a8 dc 18 ed ca 94 a4 |nOsy...f........|
[fb2 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 6e 4b 30 5f ea c4 cf 82 fd e2 |0E.!..nK0_......|
00000010 22 1f 47 b5 3e 61 19 9f 5a 6e 09 a6 59 ad 30 29 |".G.>a..Zn..Y.0)|
00000020 ec 80 f4 99 8c 02 20 61 11 ee 6e 38 33 b9 a5 20 |...... a..n83.. |
00000030 1e f4 e7 5d a8 38 7d 6d e4 61 2d 90 47 59 5a c3 |...].8}m.a-.GYZ.|
00000040 6b bd b7 0a 4c d9 a8 |k...L..|
[fb3 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[fb4 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd6b80 gate 1582330439315983600 evaluation starts
[fb5 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd6b80 signed by 0 principal evaluation starts (used [false])
[fb6 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd6b80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[fb7 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd6b80 principal evaluation succeeds for identity 0
[fb8 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd6b80 gate 1582330439315983600 evaluation succeeds
[fb9 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[fba 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[fbb 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[fbc 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[fbd 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[fbe 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes]}
[fbf 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:24
[fc0 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:24
[fc1 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[fc2 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fc3 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fc4 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fc5 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[fc6 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fc7 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fc8 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[fc9 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fca 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[fcb 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[fcc 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[fcd 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[fce 02-22 00:13:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[fcf 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[fd0 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[fd1 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[fd2 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[fd3 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[fd4 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[fd5 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[fd6 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 c7 13 8c e5 35 6a e5 8c e1 31 12 a6 8d 3a e4 |d....5j...1...:.|
00000010 b2 42 ef 43 19 93 63 77 7c 38 0b 53 88 94 6e 3f |.B.C..cw|8.S..n?|
[fd7 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 15 90 ca e3 a8 ed f2 3a d6 d2 |0E.!.........:..|
00000010 41 78 73 ae 24 f8 ed 7e 61 99 12 72 85 53 ec 08 |Axs.$..~a..r.S..|
00000020 23 46 5d 0e c5 02 20 19 24 00 92 19 9c 99 83 4e |#F]... .$......N|
00000030 30 4e 90 4a 5d d7 96 79 ab fd 6e b1 0c d5 13 5c |0N.J]..y..n....\|
00000040 39 05 7f d1 a5 1c ce |9......|
[fd8 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[fd9 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e63850 gate 1582330439325453400 evaluation starts
[fda 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e63850 signed by 0 principal evaluation starts (used [false])
[fdb 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e63850 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[fdc 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e63850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[fdd 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e63850 principal evaluation fails
[fde 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e63850 gate 1582330439325453400 evaluation fails
[fdf 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[fe0 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[fe1 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[fe2 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 c7 13 8c e5 35 6a e5 8c e1 31 12 a6 8d 3a e4 |d....5j...1...:.|
00000010 b2 42 ef 43 19 93 63 77 7c 38 0b 53 88 94 6e 3f |.B.C..cw|8.S..n?|
[fe3 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 15 90 ca e3 a8 ed f2 3a d6 d2 |0E.!.........:..|
00000010 41 78 73 ae 24 f8 ed 7e 61 99 12 72 85 53 ec 08 |Axs.$..~a..r.S..|
00000020 23 46 5d 0e c5 02 20 19 24 00 92 19 9c 99 83 4e |#F]... .$......N|
00000030 30 4e 90 4a 5d d7 96 79 ab fd 6e b1 0c d5 13 5c |0N.J]..y..n....\|
00000040 39 05 7f d1 a5 1c ce |9......|
[fe4 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[fe5 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb0150 gate 1582330439329286900 evaluation starts
[fe6 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb0150 signed by 0 principal evaluation starts (used [false])
[fe7 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb0150 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[fe8 02-22 00:13:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb0150 principal evaluation succeeds for identity 0
[fe9 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb0150 gate 1582330439329286900 evaluation succeeds
[fea 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[feb 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[fec 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[fed 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[fee 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[fef 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes]}
[ff0 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:22
[ff1 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:22
[ff2 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[ff3 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ff4 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ff5 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ff6 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[ff7 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ff8 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ff9 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ffa 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[ffb 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ffc 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[ffd 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[ffe 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[fff 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1000 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1001 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1002 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[1003 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1004 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[1005 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1006 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1007 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1008 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1009 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[100a 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[100b 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[100c 02-22 00:13:59.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[100d 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151015
[100e 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DC8B004D6C18DA7A587355688C90033FFE1116521E2B15520A0312C831A2D84E
[100f 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[1010 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[1011 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[1012 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[1013 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[1014 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510041801
[1015 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84959CC15AFE63FEC1C7C64F1E9212359E8E31F42B8CF529462E631FDF5A2C31
[1016 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[1017 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[1018 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1019 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[101b 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[1020 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[101c 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[1021 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[101a 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[1022 02-22 00:13:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[101d 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[1023 02-22 00:13:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[101e 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[1024 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1025 02-22 00:13:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1027 02-22 00:13:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[1028 02-22 00:13:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1029 02-22 00:13:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[102a 02-22 00:13:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1026 02-22 00:13:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[102b 02-22 00:13:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[102c 02-22 00:13:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[102d 02-22 00:13:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[101f 02-22 00:13:59.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[102e 02-22 00:13:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1030 02-22 00:13:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1031 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[1032 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[1035 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1036 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1037 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[1038 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1039 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[103a 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[103b 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[103c 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes
[103d 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[102f 02-22 00:13:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[103e 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[103f 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1040 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1041 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1042 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes
[1043 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1033 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1044 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[1034 02-22 00:13:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[1045 02-22 00:13:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1046 02-22 00:13:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[1047 02-22 00:13:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1048 02-22 00:13:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1049 02-22 00:13:59.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes
[104a 02-22 00:13:59.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[104b 02-22 00:13:59.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes
[104c 02-22 00:13:59.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[104d 02-22 00:13:59.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 8b 00 4d 6c 18 da 7a 58 73 55 68 8c 90 03 3f |...Ml..zXsUh...?|
00000010 fe 11 16 52 1e 2b 15 52 0a 03 12 c8 31 a2 d8 4e |...R.+.R....1..N|
[104e 02-22 00:13:59.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b e2 7a fc 08 5d 24 10 d4 44 42 aa |0D. ..z..]$..DB.|
00000010 32 bc cb b2 a6 76 dc 80 10 99 77 d9 94 c2 4c 18 |2....v....w...L.|
00000020 7e a4 b9 14 02 20 04 56 d2 71 b1 e5 71 62 f9 55 |~.... .V.q..qb.U|
00000030 66 71 7a 5f 99 45 8a 44 fa 9a da 5b ec 31 1b 50 |fqz_.E.D...[.1.P|
00000040 66 80 bb fb 8b 43 |f....C|
[104f 02-22 00:13:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes
[1050 02-22 00:13:59.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1051 02-22 00:13:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[1052 02-22 00:13:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1053 02-22 00:13:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1054 02-22 00:13:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1055 02-22 00:13:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5434550955637386366 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[1056 02-22 00:13:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5434550955637386366 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[1057 02-22 00:13:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[1058 02-22 00:13:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1059 02-22 00:14:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[105a 02-22 00:14:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[105b 02-22 00:14:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[105c 02-22 00:14:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[105d 02-22 00:14:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[105e 02-22 00:14:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[105f 02-22 00:14:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[1060 02-22 00:14:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1061 02-22 00:14:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1062 02-22 00:14:00.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1063 02-22 00:14:00.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1064 02-22 00:14:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:524209357418307188 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1065 02-22 00:14:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:524209357418307188 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1066 02-22 00:14:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1067 02-22 00:14:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1068 02-22 00:14:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1069 02-22 00:14:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[106a 02-22 00:14:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[106b 02-22 00:14:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[106c 02-22 00:14:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[106d 02-22 00:14:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[106e 02-22 00:14:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:10127842005279122732 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[106f 02-22 00:14:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10127842005279122732 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1070 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[1071 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1072 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[1073 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1074 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[1075 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1076 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 d5 75 62 f3 fa 0a 43 2d 15 57 71 0e 58 1b 72 |..ub...C-.Wq.X.r|
00000010 07 2b 8f f0 ec 61 45 4c ca 4d 37 d5 2a 22 5a 10 |.+...aEL.M7.*"Z.|
[1077 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e 6e 62 9d a5 e8 01 75 f5 4b 9c |0E.!..nb....u.K.|
00000010 11 48 78 9a af a4 d8 89 55 74 a8 9a 9d ca 64 ec |.Hx.....Ut....d.|
00000020 27 3a 28 c0 43 02 20 5f a6 63 31 fd 19 c7 1f af |':(.C. _.c1.....|
00000030 28 c2 fe f3 04 f5 9a d8 dc 26 09 09 64 14 09 37 |(........&..d..7|
00000040 a7 e4 bd 16 43 c1 50 |....C.P|
[1078 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1079 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef d7 79 1f cd 3b 66 bd a6 8a 0b |0E.!...y..;f....|
00000010 7d 28 67 73 7a 1b 8b 40 64 4a 28 a0 48 9b c7 f4 |}(gsz..@dJ(.H...|
00000020 f8 2b b7 bc 20 02 20 44 4b 1a f5 92 be c5 d9 68 |.+.. . DK......h|
00000030 13 46 47 2c 1f 39 49 5a fe 0f a4 fb 89 4a f7 43 |.FG,.9IZ.....J.C|
00000040 1c 8e 09 30 d2 58 ed |...0.X.|
[107a 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[107b 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[107c 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:26
[107d 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:26
[107e 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[107f 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1080 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1081 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1082 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[1083 02-22 00:14:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1084 02-22 00:14:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1085 02-22 00:14:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1086 02-22 00:14:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:7686489289040067956 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1087 02-22 00:14:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1088 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1089 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:7686489289040067956 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[108a 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:7686489289040067956 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[108b 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[108c 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[108d 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[108f 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1090 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[1091 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1092 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1093 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1094 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1095 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[1096 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1097 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1098 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1099 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[109a 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[108e 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[109b 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[109c 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[109d 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[109e 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[109f 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[10a0 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 20 ad 25 52 0c e2 88 37 b2 09 c5 35 d9 60 e2 |. .%R...7...5.`.|
00000010 31 f1 7a 1f 96 ef 9c d4 dd bf ab 9b 27 3f db 89 |1.z.........'?..|
[10a1 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[10a2 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 fe 36 9f 92 20 07 50 a4 0b a4 |0E.!...6.. .P...|
00000010 85 bb 2a 56 6c 1f c6 cb 18 80 5a ea eb c1 08 77 |..*Vl.....Z....w|
00000020 04 71 c5 dc b7 02 20 3b 81 e3 6f 87 83 3e bd 75 |.q.... ;..o..>.u|
00000030 55 57 5c e9 78 a7 35 5d 71 e9 df 53 2f 9a a1 4b |UW\.x.5]q..S/..K|
00000040 d0 dc 54 e0 8d 24 a3 |..T..$.|
[10a3 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[10a4 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003234c10 gate 1582330442316157400 evaluation starts
[10a5 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003234c10 signed by 0 principal evaluation starts (used [false])
[10a6 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003234c10 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[10a7 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003234c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[10a8 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003234c10 principal evaluation fails
[10a9 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003234c10 gate 1582330442316157400 evaluation fails
[10aa 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[10ab 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[10ac 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[10ad 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 20 ad 25 52 0c e2 88 37 b2 09 c5 35 d9 60 e2 |. .%R...7...5.`.|
00000010 31 f1 7a 1f 96 ef 9c d4 dd bf ab 9b 27 3f db 89 |1.z.........'?..|
[10ae 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 fe 36 9f 92 20 07 50 a4 0b a4 |0E.!...6.. .P...|
00000010 85 bb 2a 56 6c 1f c6 cb 18 80 5a ea eb c1 08 77 |..*Vl.....Z....w|
00000020 04 71 c5 dc b7 02 20 3b 81 e3 6f 87 83 3e bd 75 |.q.... ;..o..>.u|
00000030 55 57 5c e9 78 a7 35 5d 71 e9 df 53 2f 9a a1 4b |UW\.x.5]q..S/..K|
00000040 d0 dc 54 e0 8d 24 a3 |..T..$.|
[10af 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[10b0 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003235520 gate 1582330442316653800 evaluation starts
[10b1 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003235520 signed by 0 principal evaluation starts (used [false])
[10b2 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003235520 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[10b3 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003235520 principal evaluation succeeds for identity 0
[10b4 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003235520 gate 1582330442316653800 evaluation succeeds
[10b5 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[10b6 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[10b7 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[10b8 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[10b9 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[10ba 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes]}
[10bb 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:25
[10bc 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:25
[10bd 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[10be 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[10bf 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[10c0 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[10c1 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[10c2 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[10c3 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[10c4 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[10c5 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[10c6 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[10c7 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[10c8 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[10c9 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[10ca 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[10cb 02-22 00:14:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[10cc 02-22 00:14:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[10cd 02-22 00:14:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[10ce 02-22 00:14:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[10cf 02-22 00:14:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[10d0 02-22 00:14:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[10d1 02-22 00:14:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[10d2 02-22 00:14:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[10d3 02-22 00:14:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 5f af a3 97 e1 e4 3c c1 53 30 1f 0f 01 75 eb | _.....<.S0...u.|
00000010 f5 4b a7 e0 78 75 a0 13 47 66 13 6a b9 1a de 0e |.K..xu..Gf.j....|
[10d4 02-22 00:14:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 54 99 b6 59 6e 4d e8 7a 0b 73 38 |0D. VT..YnM.z.s8|
00000010 ed 0a 14 67 3a 6d 7f 97 6f 43 4f 37 79 02 ba 10 |...g:m..oCO7y...|
00000020 75 93 7d 7d 02 20 02 09 60 6e 6f ea bd 58 dd 1e |u.}}. ..`no..X..|
00000030 24 3d 16 29 54 c8 9d 28 9d 32 bc 3b 7b 9a 6f 02 |$=.)T..(.2.;{.o.|
00000040 98 95 aa 11 94 65 |.....e|
[10d6 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[10d7 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1739367110809807013 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[10d8 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[10d9 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:12980169756920553711 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[10da 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[10db 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17239257717799617471 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[10d5 02-22 00:14:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[10dd 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1739367110809807013 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[10de 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[10df 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:12980169756920553711 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[10e0 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[10e1 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b1950 gate 1582330442342566600 evaluation starts
[10dc 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17239257717799617471 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[10e2 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b1950 signed by 0 principal evaluation starts (used [false])
[10e5 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b1950 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[10e6 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b1950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[10e7 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b1950 principal evaluation fails
[10e8 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b1950 gate 1582330442342566600 evaluation fails
[10e9 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[10ea 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[10eb 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[10ec 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 5f af a3 97 e1 e4 3c c1 53 30 1f 0f 01 75 eb | _.....<.S0...u.|
00000010 f5 4b a7 e0 78 75 a0 13 47 66 13 6a b9 1a de 0e |.K..xu..Gf.j....|
[10ed 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 54 99 b6 59 6e 4d e8 7a 0b 73 38 |0D. VT..YnM.z.s8|
00000010 ed 0a 14 67 3a 6d 7f 97 6f 43 4f 37 79 02 ba 10 |...g:m..oCO7y...|
00000020 75 93 7d 7d 02 20 02 09 60 6e 6f ea bd 58 dd 1e |u.}}. ..`no..X..|
00000030 24 3d 16 29 54 c8 9d 28 9d 32 bc 3b 7b 9a 6f 02 |$=.)T..(.2.;{.o.|
00000040 98 95 aa 11 94 65 |.....e|
[10ee 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[10ef 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033063c0 gate 1582330442345977700 evaluation starts
[10f0 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033063c0 signed by 0 principal evaluation starts (used [false])
[10f1 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033063c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[10f2 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033063c0 principal evaluation succeeds for identity 0
[10f3 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033063c0 gate 1582330442345977700 evaluation succeeds
[10f4 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[10f5 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[10f6 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[10f7 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[10f8 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes
[10f9 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes]}
[10fa 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:23
[10fb 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:23
[10fc 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[10fd 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[10fe 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[10ff 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1100 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[1101 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1102 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1103 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1104 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[1105 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[1106 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[1107 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[10e3 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[10e4 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17239257717799617471 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[1108 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17239257717799617471 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[1109 02-22 00:14:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[110a 02-22 00:14:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12980169756920553711 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[110b 02-22 00:14:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12980169756920553711 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[110c 02-22 00:14:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[110d 02-22 00:14:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1739367110809807013 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[110e 02-22 00:14:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1739367110809807013 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[110f 02-22 00:14:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1739367110809807013 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[1110 02-22 00:14:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1111 02-22 00:14:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151016
[1112 02-22 00:14:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA0EE83066B5A169BD7AA3FA99FCCE36E26A3B5891E70B9337A40B67661FA29E
[1113 02-22 00:14:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[1114 02-22 00:14:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[1115 02-22 00:14:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[1116 02-22 00:14:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1117 02-22 00:14:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[1118 02-22 00:14:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1119 02-22 00:14:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[111a 02-22 00:14:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[111b 02-22 00:14:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[111c 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[111d 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[111e 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[111f 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1120 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[1121 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[1122 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1123 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[1124 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[1125 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 0e e8 30 66 b5 a1 69 bd 7a a3 fa 99 fc ce 36 |...0f..i.z.....6|
00000010 e2 6a 3b 58 91 e7 0b 93 37 a4 0b 67 66 1f a2 9e |.j;X....7..gf...|
[1126 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 7a 53 fb 16 27 17 80 98 38 1c |0E.!..zS..'...8.|
00000010 6b b0 64 2b 03 4b df 8f 00 3f db b9 c8 fa 4b c3 |k.d+.K...?....K.|
00000020 8e 66 ba 93 85 02 20 5b da 49 1d ca d7 0c 4e e8 |.f.... [.I....N.|
00000030 f6 d8 64 9e f1 3e 93 5d 2e 2f 78 98 13 11 2a c5 |..d..>.]./x...*.|
00000040 53 db 17 af 0c fa 0f |S......|
[1127 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[1128 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[1129 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[112a 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[112b 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 d5 75 62 f3 fa 0a 43 2d 15 57 71 0e 58 1b 72 |..ub...C-.Wq.X.r|
00000010 07 2b 8f f0 ec 61 45 4c ca 4d 37 d5 2a 22 5a 10 |.+...aEL.M7.*"Z.|
[112c 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e 6e 62 9d a5 e8 01 75 f5 4b 9c |0E.!..nb....u.K.|
00000010 11 48 78 9a af a4 d8 89 55 74 a8 9a 9d ca 64 ec |.Hx.....Ut....d.|
00000020 27 3a 28 c0 43 02 20 5f a6 63 31 fd 19 c7 1f af |':(.C. _.c1.....|
00000030 28 c2 fe f3 04 f5 9a d8 dc 26 09 09 64 14 09 37 |(........&..d..7|
00000040 a7 e4 bd 16 43 c1 50 |....C.P|
[112d 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[112e 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[112f 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[1130 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1131 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1132 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1133 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1134 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1135 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1136 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1137 02-22 00:14:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 5f af a3 97 e1 e4 3c c1 53 30 1f 0f 01 75 eb | _.....<.S0...u.|
00000010 f5 4b a7 e0 78 75 a0 13 47 66 13 6a b9 1a de 0e |.K..xu..Gf.j....|
[1138 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 54 99 b6 59 6e 4d e8 7a 0b 73 38 |0D. VT..YnM.z.s8|
00000010 ed 0a 14 67 3a 6d 7f 97 6f 43 4f 37 79 02 ba 10 |...g:m..oCO7y...|
00000020 75 93 7d 7d 02 20 02 09 60 6e 6f ea bd 58 dd 1e |u.}}. ..`no..X..|
00000030 24 3d 16 29 54 c8 9d 28 9d 32 bc 3b 7b 9a 6f 02 |$=.)T..(.2.;{.o.|
00000040 98 95 aa 11 94 65 |.....e|
[1139 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[113a 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e92b0 gate 1582330442380802800 evaluation starts
[113b 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e92b0 signed by 0 principal evaluation starts (used [false])
[113c 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e92b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[113d 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e92b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[113e 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e92b0 principal evaluation fails
[113f 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e92b0 gate 1582330442380802800 evaluation fails
[1140 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1141 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1142 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1143 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 5f af a3 97 e1 e4 3c c1 53 30 1f 0f 01 75 eb | _.....<.S0...u.|
00000010 f5 4b a7 e0 78 75 a0 13 47 66 13 6a b9 1a de 0e |.K..xu..Gf.j....|
[1144 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 54 99 b6 59 6e 4d e8 7a 0b 73 38 |0D. VT..YnM.z.s8|
00000010 ed 0a 14 67 3a 6d 7f 97 6f 43 4f 37 79 02 ba 10 |...g:m..oCO7y...|
00000020 75 93 7d 7d 02 20 02 09 60 6e 6f ea bd 58 dd 1e |u.}}. ..`no..X..|
00000030 24 3d 16 29 54 c8 9d 28 9d 32 bc 3b 7b 9a 6f 02 |$=.)T..(.2.;{.o.|
00000040 98 95 aa 11 94 65 |.....e|
[1145 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1146 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e9bf0 gate 1582330442382558500 evaluation starts
[1147 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e9bf0 signed by 0 principal evaluation starts (used [false])
[1148 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e9bf0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1149 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e9bf0 principal evaluation succeeds for identity 0
[114a 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e9bf0 gate 1582330442382558500 evaluation succeeds
[114b 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[114c 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[114d 02-22 00:14:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[114e 02-22 00:14:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[114f 02-22 00:14:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1150 02-22 00:14:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes
[1151 02-22 00:14:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1152 02-22 00:14:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1153 02-22 00:14:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1154 02-22 00:14:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[1155 02-22 00:14:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[1156 02-22 00:14:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 0e e8 30 66 b5 a1 69 bd 7a a3 fa 99 fc ce 36 |...0f..i.z.....6|
00000010 e2 6a 3b 58 91 e7 0b 93 37 a4 0b 67 66 1f a2 9e |.j;X....7..gf...|
[1157 02-22 00:14:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 7a 53 fb 16 27 17 80 98 38 1c |0E.!..zS..'...8.|
00000010 6b b0 64 2b 03 4b df 8f 00 3f db b9 c8 fa 4b c3 |k.d+.K...?....K.|
00000020 8e 66 ba 93 85 02 20 5b da 49 1d ca d7 0c 4e e8 |.f.... [.I....N.|
00000030 f6 d8 64 9e f1 3e 93 5d 2e 2f 78 98 13 11 2a c5 |..d..>.]./x...*.|
00000040 53 db 17 af 0c fa 0f |S......|
[1158 02-22 00:14:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[1159 02-22 00:14:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d ee 1d b2 35 79 b8 20 79 b4 a7 01 |0D. }...5y. y...|
00000010 86 37 30 16 9b 52 71 3b 2b 4b 03 8e ff 17 c1 d6 |.70..Rq;+K......|
00000020 a1 11 46 f0 02 20 7e bb 55 5c a0 6e 05 f3 df c3 |..F.. ~.U\.n....|
00000030 0c 49 02 3d 93 31 90 c0 1c 84 ff 82 23 17 30 86 |.I.=.1......#.0.|
00000040 a2 48 98 f6 9c 6a |.H...j|
[115a 02-22 00:14:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[115b 02-22 00:14:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[115c 02-22 00:14:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[115d 02-22 00:14:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[115e 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[115f 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1160 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[1161 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[1162 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 0e e8 30 66 b5 a1 69 bd 7a a3 fa 99 fc ce 36 |...0f..i.z.....6|
00000010 e2 6a 3b 58 91 e7 0b 93 37 a4 0b 67 66 1f a2 9e |.j;X....7..gf...|
[1163 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 7a 53 fb 16 27 17 80 98 38 1c |0E.!..zS..'...8.|
00000010 6b b0 64 2b 03 4b df 8f 00 3f db b9 c8 fa 4b c3 |k.d+.K...?....K.|
00000020 8e 66 ba 93 85 02 20 5b da 49 1d ca d7 0c 4e e8 |.f.... [.I....N.|
00000030 f6 d8 64 9e f1 3e 93 5d 2e 2f 78 98 13 11 2a c5 |..d..>.]./x...*.|
00000040 53 db 17 af 0c fa 0f |S......|
[1164 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[1165 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:22 , Envelope: 83 bytes, Signature: 71 bytes
[1166 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1167 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1168 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 d5 75 62 f3 fa 0a 43 2d 15 57 71 0e 58 1b 72 |..ub...C-.Wq.X.r|
00000010 07 2b 8f f0 ec 61 45 4c ca 4d 37 d5 2a 22 5a 10 |.+...aEL.M7.*"Z.|
[1169 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e 6e 62 9d a5 e8 01 75 f5 4b 9c |0E.!..nb....u.K.|
00000010 11 48 78 9a af a4 d8 89 55 74 a8 9a 9d ca 64 ec |.Hx.....Ut....d.|
00000020 27 3a 28 c0 43 02 20 5f a6 63 31 fd 19 c7 1f af |':(.C. _.c1.....|
00000030 28 c2 fe f3 04 f5 9a d8 dc 26 09 09 64 14 09 37 |(........&..d..7|
00000040 a7 e4 bd 16 43 c1 50 |....C.P|
[116a 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[116b 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[116c 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[116d 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[116e 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[116f 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1170 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1171 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1172 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1173 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1174 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 20 ad 25 52 0c e2 88 37 b2 09 c5 35 d9 60 e2 |. .%R...7...5.`.|
00000010 31 f1 7a 1f 96 ef 9c d4 dd bf ab 9b 27 3f db 89 |1.z.........'?..|
[1175 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 fe 36 9f 92 20 07 50 a4 0b a4 |0E.!...6.. .P...|
00000010 85 bb 2a 56 6c 1f c6 cb 18 80 5a ea eb c1 08 77 |..*Vl.....Z....w|
00000020 04 71 c5 dc b7 02 20 3b 81 e3 6f 87 83 3e bd 75 |.q.... ;..o..>.u|
00000030 55 57 5c e9 78 a7 35 5d 71 e9 df 53 2f 9a a1 4b |UW\.x.5]q..S/..K|
00000040 d0 dc 54 e0 8d 24 a3 |..T..$.|
[1176 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1177 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540440 gate 1582330442417156600 evaluation starts
[1178 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540440 signed by 0 principal evaluation starts (used [false])
[1179 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540440 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[117a 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[117b 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540440 principal evaluation fails
[117c 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540440 gate 1582330442417156600 evaluation fails
[117d 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[117e 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[117f 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1180 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 20 ad 25 52 0c e2 88 37 b2 09 c5 35 d9 60 e2 |. .%R...7...5.`.|
00000010 31 f1 7a 1f 96 ef 9c d4 dd bf ab 9b 27 3f db 89 |1.z.........'?..|
[1181 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 fe 36 9f 92 20 07 50 a4 0b a4 |0E.!...6.. .P...|
00000010 85 bb 2a 56 6c 1f c6 cb 18 80 5a ea eb c1 08 77 |..*Vl.....Z....w|
00000020 04 71 c5 dc b7 02 20 3b 81 e3 6f 87 83 3e bd 75 |.q.... ;..o..>.u|
00000030 55 57 5c e9 78 a7 35 5d 71 e9 df 53 2f 9a a1 4b |UW\.x.5]q..S/..K|
00000040 d0 dc 54 e0 8d 24 a3 |..T..$.|
[1182 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1183 02-22 00:14:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540d40 gate 1582330442419970100 evaluation starts
[1184 02-22 00:14:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540d40 signed by 0 principal evaluation starts (used [false])
[1185 02-22 00:14:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540d40 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1186 02-22 00:14:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540d40 principal evaluation succeeds for identity 0
[1187 02-22 00:14:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540d40 gate 1582330442419970100 evaluation succeeds
[1188 02-22 00:14:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1189 02-22 00:14:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[118a 02-22 00:14:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[118b 02-22 00:14:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[118c 02-22 00:14:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[118d 02-22 00:14:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[118e 02-22 00:14:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[118f 02-22 00:14:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1190 02-22 00:14:03.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1191 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[1192 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[1193 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1194 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[1195 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1196 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[1197 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1198 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[1199 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[119a 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[119b 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[119c 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[119d 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[119e 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[119f 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[11a0 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[11a1 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[11a2 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[11a3 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[11a4 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[11a5 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362cdb0 gate 1582330443115422800 evaluation starts
[11a6 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362cdb0 signed by 0 principal evaluation starts (used [false])
[11a7 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362cdb0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[11a8 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362cdb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[11a9 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362cdb0 principal evaluation fails
[11aa 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362cdb0 gate 1582330443115422800 evaluation fails
[11ab 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[11ac 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[11ad 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[11ae 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[11af 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[11b0 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[11b1 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d6c0 gate 1582330443116240500 evaluation starts
[11b2 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d6c0 signed by 0 principal evaluation starts (used [false])
[11b3 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d6c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[11b4 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d6c0 principal evaluation succeeds for identity 0
[11b5 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d6c0 gate 1582330443116240500 evaluation succeeds
[11b6 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[11b7 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[11b8 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[11b9 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[11ba 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[11bb 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[11bc 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[11bd 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[11be 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11bf 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11c0 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[11c1 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[11c2 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[11c3 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[11c4 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[11c5 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[11c6 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[11c7 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[11c8 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[11c9 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003641eb0 gate 1582330443118215400 evaluation starts
[11ca 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003641eb0 signed by 0 principal evaluation starts (used [false])
[11cb 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003641eb0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[11cc 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003641eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[11cd 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003641eb0 principal evaluation fails
[11ce 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003641eb0 gate 1582330443118215400 evaluation fails
[11cf 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[11d0 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[11d1 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[11d2 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[11d3 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[11d4 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[11d5 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036de7d0 gate 1582330443118928100 evaluation starts
[11d6 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036de7d0 signed by 0 principal evaluation starts (used [false])
[11d7 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036de7d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[11d8 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036de7d0 principal evaluation succeeds for identity 0
[11d9 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036de7d0 gate 1582330443118928100 evaluation succeeds
[11da 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[11db 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[11dc 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[11dd 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[11de 02-22 00:14:03.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[11df 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[11e0 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[11e1 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[11e2 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[11e3 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[11e4 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11e5 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[11e6 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[11e7 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[11e8 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[11e9 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[11ea 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[11eb 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[11ec 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[11ed 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[11ee 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[11ef 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037293c0 gate 1582330443124270300 evaluation starts
[11f0 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037293c0 signed by 0 principal evaluation starts (used [false])
[11f1 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037293c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[11f2 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[11f3 02-22 00:14:03.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037293c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[11f4 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037293c0 principal evaluation fails
[11f5 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037293c0 gate 1582330443124270300 evaluation fails
[11f6 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[11f7 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[11f8 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[11f9 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[11fa 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[11fb 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[11fc 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546a10 gate 1582330443133847700 evaluation starts
[11fd 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546a10 signed by 0 principal evaluation starts (used [false])
[11fe 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546a10 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[11ff 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546a10 principal evaluation succeeds for identity 0
[1200 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546a10 gate 1582330443133847700 evaluation succeeds
[1201 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1202 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1203 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1204 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1205 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1206 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1207 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1208 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1209 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[120a 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[120b 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[120c 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[120d 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[120e 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[120f 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1210 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003784480 gate 1582330443135144200 evaluation starts
[1211 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003784480 signed by 0 principal evaluation starts (used [false])
[1212 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003784480 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1213 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003784480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1214 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003784480 principal evaluation fails
[1215 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003784480 gate 1582330443135144200 evaluation fails
[1216 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1217 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1218 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1219 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[121a 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[121b 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[121c 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003784dd0 gate 1582330443135600900 evaluation starts
[121d 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003784dd0 signed by 0 principal evaluation starts (used [false])
[121e 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003784dd0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[121f 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003784dd0 principal evaluation succeeds for identity 0
[1220 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003784dd0 gate 1582330443135600900 evaluation succeeds
[1221 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1222 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1223 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1224 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1225 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1226 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[1227 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1228 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1229 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[122a 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[122b 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[122c 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[122d 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[122e 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[122f 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1230 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1231 02-22 00:14:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[1232 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1233 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792ae0 gate 1582330443141208300 evaluation starts
[1234 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792ae0 signed by 0 principal evaluation starts (used [false])
[1235 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792ae0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1236 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1237 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792ae0 principal evaluation fails
[1238 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792ae0 gate 1582330443141208300 evaluation fails
[1239 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[123a 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[123b 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[123c 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[123d 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[123e 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[123f 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037933e0 gate 1582330443141883600 evaluation starts
[1240 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037933e0 signed by 0 principal evaluation starts (used [false])
[1241 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037933e0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1242 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037933e0 principal evaluation succeeds for identity 0
[1243 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037933e0 gate 1582330443141883600 evaluation succeeds
[1244 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1245 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1246 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1247 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1248 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[1249 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[124a 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[124b 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[124c 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[124d 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[124e 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[124f 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1250 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1251 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1252 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1253 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1254 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1255 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d500 gate 1582330443143944600 evaluation starts
[1256 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d500 signed by 0 principal evaluation starts (used [false])
[1257 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d500 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1258 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1259 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d500 principal evaluation fails
[125a 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d500 gate 1582330443143944600 evaluation fails
[125b 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[125c 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[125d 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[125e 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[125f 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1260 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1261 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389de10 gate 1582330443145104900 evaluation starts
[1262 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389de10 signed by 0 principal evaluation starts (used [false])
[1263 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389de10 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1264 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389de10 principal evaluation succeeds for identity 0
[1265 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389de10 gate 1582330443145104900 evaluation succeeds
[1266 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1267 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1268 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1269 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[126a 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[126b 02-22 00:14:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[126c 02-22 00:14:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[126d 02-22 00:14:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[126e 02-22 00:14:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[126f 02-22 00:14:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[1270 02-22 00:14:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1271 02-22 00:14:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1272 02-22 00:14:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11461865706323506074 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[1273 02-22 00:14:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11461865706323506074 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[1274 02-22 00:14:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1275 02-22 00:14:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11461865706323506074 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[1276 02-22 00:14:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 11461865706323506074 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[1277 02-22 00:14:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1278 02-22 00:14:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[1279 02-22 00:14:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[127a 02-22 00:14:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[127b 02-22 00:14:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[127c 02-22 00:14:03.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6519309426168219592 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[127d 02-22 00:14:03.71 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6519309426168219592 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[127e 02-22 00:14:03.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[127f 02-22 00:14:03.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1280 02-22 00:14:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[1281 02-22 00:14:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1282 02-22 00:14:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1283 02-22 00:14:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1284 02-22 00:14:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1285 02-22 00:14:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1286 02-22 00:14:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1287 02-22 00:14:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1288 02-22 00:14:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1289 02-22 00:14:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 7b 6e e2 7c 23 6c 7d 19 f8 e0 cd ae d6 10 01 |.{n.|#l}........|
00000010 41 a4 1a ed bc a8 1b 8d b3 26 1d 8b a9 85 3f 35 |A........&....?5|
[128a 02-22 00:14:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 8c c5 73 9b c6 33 1e 69 6e 22 55 |0D. &..s..3.in"U|
00000010 02 55 d7 0f 15 da 20 2d f4 2f 6c a2 b5 a8 98 ca |.U.... -./l.....|
00000020 b3 37 b6 7a 02 20 10 5d 52 54 ea c8 f6 97 95 f6 |.7.z. .]RT......|
00000030 1b 3c 0e 36 41 c5 4a ec fa df 8d f1 63 70 2b b2 |.<.6A.J.....cp+.|
00000040 f8 f2 01 2a 92 be |...*..|
[128b 02-22 00:14:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[128c 02-22 00:14:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d a8 da 21 6e 2a fb d7 44 b0 65 |0E.!....!n*..D.e|
00000010 f9 e2 3f da 77 98 43 dc 78 fe 5d 7e f7 d4 8d b2 |..?.w.C.x.]~....|
00000020 ef 65 1d 07 63 02 20 6e d0 bc fe fb fb 49 6c 5b |.e..c. n.....Il[|
00000030 24 f4 56 10 2a 2d 3e 47 63 2b 87 38 ac 3c 76 5d |$.V.*->Gc+.8.<v]|
00000040 c8 9f c1 20 e3 62 e7 |... .b.|
[128d 02-22 00:14:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[128e 02-22 00:14:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[128f 02-22 00:14:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:27
[1290 02-22 00:14:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:27
[1291 02-22 00:14:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[1292 02-22 00:14:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1293 02-22 00:14:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1294 02-22 00:14:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1295 02-22 00:14:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1296 02-22 00:14:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1297 02-22 00:14:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1298 02-22 00:14:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1299 02-22 00:14:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[129a 02-22 00:14:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[129b 02-22 00:14:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes
[129c 02-22 00:14:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes
[129d 02-22 00:14:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[129e 02-22 00:14:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[129f 02-22 00:14:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes
[12a0 02-22 00:14:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes
[12a1 02-22 00:14:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12a2 02-22 00:14:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes
[12a3 02-22 00:14:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12a4 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[12a5 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[12a6 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12a7 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[12a8 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[12a9 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12aa 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[12ab 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[12ac 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[12ad 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[12ae 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[12af 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[12b0 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 52 20 81 f3 3f 9e 5b b9 1b f0 a3 4f 05 8d 0f |.R ..?.[....O...|
00000010 4b 09 cf 71 c0 c8 53 53 5d f4 f2 66 24 db fb 64 |K..q..SS]..f$..d|
[12b1 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c b2 4e 8a 78 e9 88 ff dd b6 ba 14 |0D. <.N.x.......|
00000010 35 7e b9 ab cc 09 d2 85 a2 36 28 f2 e5 37 5d b3 |5~.......6(..7].|
00000020 10 32 c5 80 02 20 21 59 d2 d3 26 40 79 09 1d 14 |.2... !Y..&@y...|
00000030 54 6f be 54 5a 0d 2b b3 7d fd 0a a9 ac cc ab c1 |To.TZ.+.}.......|
00000040 11 66 9e 2c 5f a5 |.f.,_.|
[12b2 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[12b3 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bebc0 gate 1582330444289582600 evaluation starts
[12b4 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bebc0 signed by 0 principal evaluation starts (used [false])
[12b5 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bebc0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[12b6 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bebc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[12b7 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bebc0 principal evaluation fails
[12b8 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bebc0 gate 1582330444289582600 evaluation fails
[12b9 02-22 00:14:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[12ba 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[12bb 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[12bc 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 52 20 81 f3 3f 9e 5b b9 1b f0 a3 4f 05 8d 0f |.R ..?.[....O...|
00000010 4b 09 cf 71 c0 c8 53 53 5d f4 f2 66 24 db fb 64 |K..q..SS]..f$..d|
[12bd 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c b2 4e 8a 78 e9 88 ff dd b6 ba 14 |0D. <.N.x.......|
00000010 35 7e b9 ab cc 09 d2 85 a2 36 28 f2 e5 37 5d b3 |5~.......6(..7].|
00000020 10 32 c5 80 02 20 21 59 d2 d3 26 40 79 09 1d 14 |.2... !Y..&@y...|
00000030 54 6f be 54 5a 0d 2b b3 7d fd 0a a9 ac cc ab c1 |To.TZ.+.}.......|
00000040 11 66 9e 2c 5f a5 |.f.,_.|
[12be 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[12bf 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bf4c0 gate 1582330444296763300 evaluation starts
[12c0 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bf4c0 signed by 0 principal evaluation starts (used [false])
[12c1 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bf4c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[12c2 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bf4c0 principal evaluation succeeds for identity 0
[12c3 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bf4c0 gate 1582330444296763300 evaluation succeeds
[12c4 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[12c5 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[12c6 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[12c7 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[12c8 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[12c9 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes]}
[12ca 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:26
[12cb 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:26
[12cc 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[12cd 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12ce 02-22 00:14:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12cf 02-22 00:14:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12d0 02-22 00:14:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12d1 02-22 00:14:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12d2 02-22 00:14:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12d3 02-22 00:14:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12d4 02-22 00:14:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12d5 02-22 00:14:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12d6 02-22 00:14:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[12d7 02-22 00:14:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12d8 02-22 00:14:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12d9 02-22 00:14:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[12da 02-22 00:14:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[12db 02-22 00:14:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12dc 02-22 00:14:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[12dd 02-22 00:14:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12de 02-22 00:14:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[12df 02-22 00:14:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12e0 02-22 00:14:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[12e1 02-22 00:14:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12e2 02-22 00:14:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[12e3 02-22 00:14:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[12e4 02-22 00:14:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12e5 02-22 00:14:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12e6 02-22 00:14:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12e7 02-22 00:14:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12e8 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[12e9 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[12ea 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[12eb 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[12ec 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[12ed 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[12ee 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[12ef 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[12f0 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[12f1 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[12f2 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[12f3 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe 35 42 fc 5d e8 6b 43 f2 42 f1 2c f1 6e 41 0d |.5B.].kC.B.,.nA.|
00000010 68 25 eb 12 08 ee 3e 6d e9 4c 88 d4 b0 9a 08 6a |h%....>m.L.....j|
[12f4 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 3f 37 f0 7c 2d 12 1d 08 13 e9 e0 |0D. E?7.|-......|
00000010 06 fc ef 89 17 9c c6 94 2d 61 7c 10 9f a3 5c 9d |........-a|...\.|
00000020 2a 0b f5 d6 02 20 49 77 9a 65 f1 f4 de 3f bf 79 |*.... Iw.e...?.y|
00000030 2f d5 b5 74 cf 02 d3 03 52 ac 4d 46 47 c1 ab 3e |/..t....R.MFG..>|
00000040 86 40 3c cf 57 21 |.@<.W!|
[12f5 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[12f6 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4d860 gate 1582330444348483900 evaluation starts
[12f7 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4d860 signed by 0 principal evaluation starts (used [false])
[12f8 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4d860 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[12f9 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4d860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[12fa 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4d860 principal evaluation fails
[12fb 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4d860 gate 1582330444348483900 evaluation fails
[12fc 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[12fd 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[12fe 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[12ff 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe 35 42 fc 5d e8 6b 43 f2 42 f1 2c f1 6e 41 0d |.5B.].kC.B.,.nA.|
00000010 68 25 eb 12 08 ee 3e 6d e9 4c 88 d4 b0 9a 08 6a |h%....>m.L.....j|
[1300 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 3f 37 f0 7c 2d 12 1d 08 13 e9 e0 |0D. E?7.|-......|
00000010 06 fc ef 89 17 9c c6 94 2d 61 7c 10 9f a3 5c 9d |........-a|...\.|
00000020 2a 0b f5 d6 02 20 49 77 9a 65 f1 f4 de 3f bf 79 |*.... Iw.e...?.y|
00000030 2f d5 b5 74 cf 02 d3 03 52 ac 4d 46 47 c1 ab 3e |/..t....R.MFG..>|
00000040 86 40 3c cf 57 21 |.@<.W!|
[1301 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1302 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a82160 gate 1582330444349044500 evaluation starts
[1303 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a82160 signed by 0 principal evaluation starts (used [false])
[1304 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a82160 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1305 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a82160 principal evaluation succeeds for identity 0
[1306 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a82160 gate 1582330444349044500 evaluation succeeds
[1307 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1308 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1309 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[130a 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[130b 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[130c 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes]}
[130d 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:24
[130e 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:24
[130f 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[1310 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1311 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1312 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1313 02-22 00:14:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1314 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1315 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1316 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1317 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1318 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1319 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[131a 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[131b 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[131c 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[131d 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[131e 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[131f 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[1320 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1321 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[1322 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[1323 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151017
[1324 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7F9A61A2175BEB6B2C722D8DCA98367D634DF2B61675A90CB6A3B4A378956506
[1325 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510051801
[1326 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2A2C5F9B28A65450A3AF4AECB81C0A0DFA3C8D7BC3B2BF299B2F9657FE9BA4CA
[1327 02-22 00:14:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[1328 02-22 00:14:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[132a 02-22 00:14:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[132b 02-22 00:14:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[1329 02-22 00:14:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[132c 02-22 00:14:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[132d 02-22 00:14:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[132e 02-22 00:14:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[132f 02-22 00:14:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[1330 02-22 00:14:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[1331 02-22 00:14:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1332 02-22 00:14:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes
[1333 02-22 00:14:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1334 02-22 00:14:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1335 02-22 00:14:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1336 02-22 00:14:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1337 02-22 00:14:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1338 02-22 00:14:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[1339 02-22 00:14:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[133a 02-22 00:14:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[133b 02-22 00:14:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[133c 02-22 00:14:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[133d 02-22 00:14:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[133e 02-22 00:14:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[133f 02-22 00:14:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[1341 02-22 00:14:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes
[1342 02-22 00:14:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1343 02-22 00:14:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[1344 02-22 00:14:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1345 02-22 00:14:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes
[1346 02-22 00:14:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1340 02-22 00:14:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1347 02-22 00:14:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1348 02-22 00:14:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:12594668290458628587 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1349 02-22 00:14:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:12594668290458628587 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[134a 02-22 00:14:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[134b 02-22 00:14:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[134c 02-22 00:14:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[134d 02-22 00:14:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[134e 02-22 00:14:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[134f 02-22 00:14:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1350 02-22 00:14:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[1351 02-22 00:14:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1352 02-22 00:14:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:3582126326888258460 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1353 02-22 00:14:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:3582126326888258460 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1354 02-22 00:14:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[1355 02-22 00:14:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1356 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[1357 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1358 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[1359 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[135a 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 92 d1 ff dd 20 3c a5 5c 08 4c 60 7f ae ef 50 |..... <.\.L`...P|
00000010 c3 40 5f ba 10 9c 49 46 08 5c 2b f5 f9 6b 29 6a |.@_...IF.\+..k)j|
[135b 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac 79 8d 42 69 a0 54 6d 63 1c 01 |0E.!..y.Bi.Tmc..|
00000010 d1 c4 00 60 d3 cb 62 db f9 95 40 3b c2 dc 86 a0 |...`..b...@;....|
00000020 d9 68 0c 49 6b 02 20 36 57 6c 92 f1 62 19 1f 7a |.h.Ik. 6Wl..b..z|
00000030 88 49 ab 47 48 e5 22 c0 5b f7 bb df 16 d2 d0 da |.I.GH.".[.......|
00000040 2b 55 b5 17 ac 81 03 |+U.....|
[135c 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[135d 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 f1 db 74 a3 6f f1 30 ff 14 4f 6d |0D. ...t.o.0..Om|
00000010 1f 43 e4 18 77 43 e1 d5 54 c1 d4 65 cc ca d1 d7 |.C..wC..T..e....|
00000020 d8 e3 3b 0a 02 20 19 f6 59 49 db ef 7d 8b b8 e2 |..;.. ..YI..}...|
00000030 97 4d 3c 67 b2 5c 00 24 e9 86 da b8 32 be f3 04 |.M<g.\.$....2...|
00000040 e8 53 51 8b 6d ed |.SQ.m.|
[135e 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[135f 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[1360 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:28
[1361 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:28
[1362 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[1363 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1364 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1365 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1366 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[1367 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1368 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1369 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[136a 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[136b 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[136c 02-22 00:14:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[136d 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[136e 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[136f 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1370 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[1371 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[1372 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1373 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1374 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1375 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1376 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1377 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1378 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1379 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 01 cd d6 1a 43 b0 4f b7 3a 44 b8 84 21 3e fd |.....C.O.:D..!>.|
00000010 38 af bc 63 bb b7 5a ee 1f 77 e3 8c a4 4f 1a 02 |8..c..Z..w...O..|
[137a 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 f6 b2 de 6e 91 fe b5 38 80 ee 07 |0D. ...n...8...|
00000010 d5 fe 16 39 6d 48 b4 a3 dd 0d 3d 9e f2 a8 1c 0d |...9mH....=.....|
00000020 88 e1 75 3c 02 20 52 99 77 ca be f2 a0 93 7a 32 |..u<. R.w.....z2|
00000030 0e c4 d0 ca 6b 52 c9 03 bb d6 3f 55 00 a7 54 50 |....kR....?U..TP|
00000040 bc 88 24 b1 55 3f |..$.U?|
[137b 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[137c 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96040 gate 1582330446294413100 evaluation starts
[137d 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96040 signed by 0 principal evaluation starts (used [false])
[137e 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96040 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[137f 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1380 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96040 principal evaluation fails
[1381 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96040 gate 1582330446294413100 evaluation fails
[1382 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1383 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1384 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1385 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 01 cd d6 1a 43 b0 4f b7 3a 44 b8 84 21 3e fd |.....C.O.:D..!>.|
00000010 38 af bc 63 bb b7 5a ee 1f 77 e3 8c a4 4f 1a 02 |8..c..Z..w...O..|
[1386 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 f6 b2 de 6e 91 fe b5 38 80 ee 07 |0D. ...n...8...|
00000010 d5 fe 16 39 6d 48 b4 a3 dd 0d 3d 9e f2 a8 1c 0d |...9mH....=.....|
00000020 88 e1 75 3c 02 20 52 99 77 ca be f2 a0 93 7a 32 |..u<. R.w.....z2|
00000030 0e c4 d0 ca 6b 52 c9 03 bb d6 3f 55 00 a7 54 50 |....kR....?U..TP|
00000040 bc 88 24 b1 55 3f |..$.U?|
[1387 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1388 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96990 gate 1582330446294843900 evaluation starts
[1389 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96990 signed by 0 principal evaluation starts (used [false])
[138a 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96990 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[138b 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96990 principal evaluation succeeds for identity 0
[138c 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96990 gate 1582330446294843900 evaluation succeeds
[138d 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[138e 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[138f 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1390 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1391 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes
[1392 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes]}
[1393 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:27
[1394 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:27
[1395 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[1396 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1397 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1398 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1399 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[139a 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[139b 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[139c 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[139d 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[139e 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[139f 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[13a0 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[13a1 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[13a2 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[13a3 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[13a4 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[13a5 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[13a6 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[13a7 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[13a8 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[13a9 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[13aa 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[13ab 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[13ac 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 fd 0b ec 0b eb 5a 3b 73 05 85 aa 06 11 be 09 |B.....Z;s.......|
00000010 b2 69 a1 52 52 95 9a 79 1c 9f 62 0a 70 f6 87 7c |.i.RR..y..b.p..||
[13ad 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc d0 cc 0d d6 06 ab b3 a5 e4 7e |0E.!...........~|
00000010 d6 e0 6c a3 79 48 83 e3 9f 0c bc 20 3e a1 7c 86 |..l.yH..... >.|.|
00000020 cf a0 b6 72 50 02 20 11 40 d3 2e 35 b1 60 55 a0 |...rP. .@..5.`U.|
00000030 27 55 55 99 9b 7e 0c f0 67 59 3f 3a 9a 91 f1 f6 |'UU..~..gY?:....|
00000040 88 5f f9 a6 80 a7 c0 |._.....|
[13ae 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[13af 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf3800 gate 1582330446299515800 evaluation starts
[13b0 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf3800 signed by 0 principal evaluation starts (used [false])
[13b1 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf3800 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[13b2 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf3800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[13b3 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf3800 principal evaluation fails
[13b4 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf3800 gate 1582330446299515800 evaluation fails
[13b5 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[13b6 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[13b7 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[13b8 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 fd 0b ec 0b eb 5a 3b 73 05 85 aa 06 11 be 09 |B.....Z;s.......|
00000010 b2 69 a1 52 52 95 9a 79 1c 9f 62 0a 70 f6 87 7c |.i.RR..y..b.p..||
[13b9 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc d0 cc 0d d6 06 ab b3 a5 e4 7e |0E.!...........~|
00000010 d6 e0 6c a3 79 48 83 e3 9f 0c bc 20 3e a1 7c 86 |..l.yH..... >.|.|
00000020 cf a0 b6 72 50 02 20 11 40 d3 2e 35 b1 60 55 a0 |...rP. .@..5.`U.|
00000030 27 55 55 99 9b 7e 0c f0 67 59 3f 3a 9a 91 f1 f6 |'UU..~..gY?:....|
00000040 88 5f f9 a6 80 a7 c0 |._.....|
[13ba 02-22 00:14:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[13bb 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c16100 gate 1582330446299996400 evaluation starts
[13bc 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c16100 signed by 0 principal evaluation starts (used [false])
[13bd 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c16100 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[13be 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c16100 principal evaluation succeeds for identity 0
[13bf 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c16100 gate 1582330446299996400 evaluation succeeds
[13c0 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[13c1 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[13c2 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[13c3 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[13c4 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[13c5 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes]}
[13c6 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:25
[13c7 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:25
[13c8 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[13c9 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[13ca 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[13cb 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[13cc 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[13cd 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[13ce 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[13cf 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[13d0 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[13d1 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[13d2 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[13d3 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[13d4 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:17584495356861516575 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[13d5 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:17584495356861516575 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[13d6 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:17584495356861516575 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[13d7 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[13d8 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[13d9 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[13da 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[13db 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[13dc 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[13dd 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[13de 02-22 00:14:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[13df 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[13e0 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13164483397090981350 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[13e1 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[13e2 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:15702637426373591718 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[13e3 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[13e4 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:4555825674187564922 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[13e5 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:4555825674187564922 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[13e6 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[13e7 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13164483397090981350 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[13e8 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[13e9 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:15702637426373591718 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[13ea 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[13eb 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4555825674187564922 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[13ec 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4555825674187564922 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[13ed 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[13ee 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15702637426373591718 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[13ef 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15702637426373591718 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[13f0 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15702637426373591718 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[13f1 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[13f2 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13164483397090981350 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[13f3 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13164483397090981350 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[13f4 02-22 00:14:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[13f5 02-22 00:14:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151018
[13f6 02-22 00:14:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3A852C624CE09F9BCF5D16CFCC765C9AC9EC4033DB76235017BA0C84D90184DA
[13f7 02-22 00:14:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[13f8 02-22 00:14:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[13f9 02-22 00:14:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[13fa 02-22 00:14:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[13fb 02-22 00:14:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[13fc 02-22 00:14:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[13fd 02-22 00:14:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[13fe 02-22 00:14:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[13ff 02-22 00:14:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1400 02-22 00:14:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1401 02-22 00:14:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1402 02-22 00:14:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1403 02-22 00:14:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1404 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[1405 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[1406 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1407 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[1408 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[1409 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[140a 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[140b 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[140c 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[140d 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[140e 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[140f 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1410 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 fd 0b ec 0b eb 5a 3b 73 05 85 aa 06 11 be 09 |B.....Z;s.......|
00000010 b2 69 a1 52 52 95 9a 79 1c 9f 62 0a 70 f6 87 7c |.i.RR..y..b.p..||
[1411 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc d0 cc 0d d6 06 ab b3 a5 e4 7e |0E.!...........~|
00000010 d6 e0 6c a3 79 48 83 e3 9f 0c bc 20 3e a1 7c 86 |..l.yH..... >.|.|
00000020 cf a0 b6 72 50 02 20 11 40 d3 2e 35 b1 60 55 a0 |...rP. .@..5.`U.|
00000030 27 55 55 99 9b 7e 0c f0 67 59 3f 3a 9a 91 f1 f6 |'UU..~..gY?:....|
00000040 88 5f f9 a6 80 a7 c0 |._.....|
[1412 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1413 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca1880 gate 1582330446380789200 evaluation starts
[1414 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca1880 signed by 0 principal evaluation starts (used [false])
[1415 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca1880 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1416 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca1880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1417 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca1880 principal evaluation fails
[1418 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca1880 gate 1582330446380789200 evaluation fails
[1419 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[141a 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[141b 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[141c 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 fd 0b ec 0b eb 5a 3b 73 05 85 aa 06 11 be 09 |B.....Z;s.......|
00000010 b2 69 a1 52 52 95 9a 79 1c 9f 62 0a 70 f6 87 7c |.i.RR..y..b.p..||
[141d 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc d0 cc 0d d6 06 ab b3 a5 e4 7e |0E.!...........~|
00000010 d6 e0 6c a3 79 48 83 e3 9f 0c bc 20 3e a1 7c 86 |..l.yH..... >.|.|
00000020 cf a0 b6 72 50 02 20 11 40 d3 2e 35 b1 60 55 a0 |...rP. .@..5.`U.|
00000030 27 55 55 99 9b 7e 0c f0 67 59 3f 3a 9a 91 f1 f6 |'UU..~..gY?:....|
00000040 88 5f f9 a6 80 a7 c0 |._.....|
[141e 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[141f 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd4180 gate 1582330446381348300 evaluation starts
[1420 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd4180 signed by 0 principal evaluation starts (used [false])
[1421 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd4180 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1422 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd4180 principal evaluation succeeds for identity 0
[1423 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd4180 gate 1582330446381348300 evaluation succeeds
[1424 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1425 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1426 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1427 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1428 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[1429 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[142a 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[142b 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 85 2c 62 4c e0 9f 9b cf 5d 16 cf cc 76 5c 9a |:.,bL....]...v\.|
00000010 c9 ec 40 33 db 76 23 50 17 ba 0c 84 d9 01 84 da |..@3.v#P........|
[142c 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 96 6d 74 bc c7 1d f0 9c 18 99 |0E.!...mt.......|
00000010 fb e3 f4 8c af d1 5d f4 ee b6 c4 63 7b 19 e7 5e |......]....c{..^|
00000020 2a 97 2e d6 2f 02 20 6f b0 61 51 d4 d2 f4 86 52 |*.../. o.aQ....R|
00000030 9f 5a aa f0 f1 e7 01 92 80 e9 5b 69 79 a1 13 62 |.Z........[iy..b|
00000040 28 c2 52 d8 6d 97 8a |(.R.m..|
[142d 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[142e 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[142f 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1430 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1431 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 92 d1 ff dd 20 3c a5 5c 08 4c 60 7f ae ef 50 |..... <.\.L`...P|
00000010 c3 40 5f ba 10 9c 49 46 08 5c 2b f5 f9 6b 29 6a |.@_...IF.\+..k)j|
[1432 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac 79 8d 42 69 a0 54 6d 63 1c 01 |0E.!..y.Bi.Tmc..|
00000010 d1 c4 00 60 d3 cb 62 db f9 95 40 3b c2 dc 86 a0 |...`..b...@;....|
00000020 d9 68 0c 49 6b 02 20 36 57 6c 92 f1 62 19 1f 7a |.h.Ik. 6Wl..b..z|
00000030 88 49 ab 47 48 e5 22 c0 5b f7 bb df 16 d2 d0 da |.I.GH.".[.......|
00000040 2b 55 b5 17 ac 81 03 |+U.....|
[1433 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[1434 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1435 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1436 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[1437 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1438 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[1439 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[143a 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 85 2c 62 4c e0 9f 9b cf 5d 16 cf cc 76 5c 9a |:.,bL....]...v\.|
00000010 c9 ec 40 33 db 76 23 50 17 ba 0c 84 d9 01 84 da |..@3.v#P........|
[143b 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 96 6d 74 bc c7 1d f0 9c 18 99 |0E.!...mt.......|
00000010 fb e3 f4 8c af d1 5d f4 ee b6 c4 63 7b 19 e7 5e |......]....c{..^|
00000020 2a 97 2e d6 2f 02 20 6f b0 61 51 d4 d2 f4 86 52 |*.../. o.aQ....R|
00000030 9f 5a aa f0 f1 e7 01 92 80 e9 5b 69 79 a1 13 62 |.Z........[iy..b|
00000040 28 c2 52 d8 6d 97 8a |(.R.m..|
[143c 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[143d 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes
[143e 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[143f 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1440 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 92 d1 ff dd 20 3c a5 5c 08 4c 60 7f ae ef 50 |..... <.\.L`...P|
00000010 c3 40 5f ba 10 9c 49 46 08 5c 2b f5 f9 6b 29 6a |.@_...IF.\+..k)j|
[1441 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac 79 8d 42 69 a0 54 6d 63 1c 01 |0E.!..y.Bi.Tmc..|
00000010 d1 c4 00 60 d3 cb 62 db f9 95 40 3b c2 dc 86 a0 |...`..b...@;....|
00000020 d9 68 0c 49 6b 02 20 36 57 6c 92 f1 62 19 1f 7a |.h.Ik. 6Wl..b..z|
00000030 88 49 ab 47 48 e5 22 c0 5b f7 bb df 16 d2 d0 da |.I.GH.".[.......|
00000040 2b 55 b5 17 ac 81 03 |+U.....|
[1442 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[1443 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1444 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[1445 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1446 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1447 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1448 02-22 00:14:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1449 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[144a 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[144b 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[144c 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 01 cd d6 1a 43 b0 4f b7 3a 44 b8 84 21 3e fd |.....C.O.:D..!>.|
00000010 38 af bc 63 bb b7 5a ee 1f 77 e3 8c a4 4f 1a 02 |8..c..Z..w...O..|
[144d 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 f6 b2 de 6e 91 fe b5 38 80 ee 07 |0D. ...n...8...|
00000010 d5 fe 16 39 6d 48 b4 a3 dd 0d 3d 9e f2 a8 1c 0d |...9mH....=.....|
00000020 88 e1 75 3c 02 20 52 99 77 ca be f2 a0 93 7a 32 |..u<. R.w.....z2|
00000030 0e c4 d0 ca 6b 52 c9 03 bb d6 3f 55 00 a7 54 50 |....kR....?U..TP|
00000040 bc 88 24 b1 55 3f |..$.U?|
[144e 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[144f 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3ba10 gate 1582330446390272500 evaluation starts
[1450 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3ba10 signed by 0 principal evaluation starts (used [false])
[1451 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3ba10 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1452 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3ba10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1453 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3ba10 principal evaluation fails
[1454 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3ba10 gate 1582330446390272500 evaluation fails
[1455 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1456 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1457 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1458 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 01 cd d6 1a 43 b0 4f b7 3a 44 b8 84 21 3e fd |.....C.O.:D..!>.|
00000010 38 af bc 63 bb b7 5a ee 1f 77 e3 8c a4 4f 1a 02 |8..c..Z..w...O..|
[1459 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 f6 b2 de 6e 91 fe b5 38 80 ee 07 |0D. ...n...8...|
00000010 d5 fe 16 39 6d 48 b4 a3 dd 0d 3d 9e f2 a8 1c 0d |...9mH....=.....|
00000020 88 e1 75 3c 02 20 52 99 77 ca be f2 a0 93 7a 32 |..u<. R.w.....z2|
00000030 0e c4 d0 ca 6b 52 c9 03 bb d6 3f 55 00 a7 54 50 |....kR....?U..TP|
00000040 bc 88 24 b1 55 3f |..$.U?|
[145a 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[145b 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e50310 gate 1582330446390680700 evaluation starts
[145c 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e50310 signed by 0 principal evaluation starts (used [false])
[145d 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e50310 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[145e 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e50310 principal evaluation succeeds for identity 0
[145f 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e50310 gate 1582330446390680700 evaluation succeeds
[1460 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1461 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1462 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1463 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1464 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes
[1465 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1466 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1467 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[1468 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1469 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[146a 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[146b 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 85 2c 62 4c e0 9f 9b cf 5d 16 cf cc 76 5c 9a |:.,bL....]...v\.|
00000010 c9 ec 40 33 db 76 23 50 17 ba 0c 84 d9 01 84 da |..@3.v#P........|
[146c 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 96 6d 74 bc c7 1d f0 9c 18 99 |0E.!...mt.......|
00000010 fb e3 f4 8c af d1 5d f4 ee b6 c4 63 7b 19 e7 5e |......]....c{..^|
00000020 2a 97 2e d6 2f 02 20 6f b0 61 51 d4 d2 f4 86 52 |*.../. o.aQ....R|
00000030 9f 5a aa f0 f1 e7 01 92 80 e9 5b 69 79 a1 13 62 |.Z........[iy..b|
00000040 28 c2 52 d8 6d 97 8a |(.R.m..|
[146d 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[146e 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 27 a4 9f ec ac ac 48 b7 7f 5f 5c |0D. .'.....H.._\|
00000010 1f c3 1d 44 ab 3c 14 12 0a 3f 55 0e a9 11 38 76 |...D.<...?U...8v|
00000020 62 b5 38 9f 02 20 13 ce 5c e8 13 80 9a 6e b2 31 |b.8.. ..\....n.1|
00000030 61 9d 69 d4 18 63 f8 44 2c e1 f5 8a 40 c2 34 ca |a.i..c.D,...@.4.|
00000040 ee da 9e e9 6a 0d |....j.|
[146f 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1470 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1471 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1472 02-22 00:14:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1473 02-22 00:14:07.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1474 02-22 00:14:07.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1475 02-22 00:14:07.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[1476 02-22 00:14:07.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[1477 02-22 00:14:07.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1478 02-22 00:14:07.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[1479 02-22 00:14:07.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[147a 02-22 00:14:07.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[147b 02-22 00:14:07.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[147c 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[147d 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[147e 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[147f 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[1480 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[1481 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1482 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1483 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[1484 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1485 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1486 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1487 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1488 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1489 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[148a 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[148b 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[148c 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[148d 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13f90 gate 1582330447113429400 evaluation starts
[148e 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13f90 signed by 0 principal evaluation starts (used [false])
[148f 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13f90 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1490 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13f90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1491 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13f90 principal evaluation fails
[1492 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13f90 gate 1582330447113429400 evaluation fails
[1493 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1494 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1495 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1496 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1497 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1498 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1499 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f90890 gate 1582330447113848600 evaluation starts
[149a 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f90890 signed by 0 principal evaluation starts (used [false])
[149b 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f90890 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[149c 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f90890 principal evaluation succeeds for identity 0
[149d 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f90890 gate 1582330447113848600 evaluation succeeds
[149e 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[149f 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[14a0 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[14a1 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[14a2 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14a3 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14a4 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[14a5 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[14a6 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[14a7 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[14a8 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[14a9 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[14aa 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[14ab 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[14ac 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[14ad 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa02f0 gate 1582330447114780900 evaluation starts
[14ae 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa02f0 signed by 0 principal evaluation starts (used [false])
[14af 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa02f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[14b0 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa02f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[14b1 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa02f0 principal evaluation fails
[14b2 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa02f0 gate 1582330447114780900 evaluation fails
[14b3 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[14b4 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[14b5 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[14b6 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[14b7 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[14b8 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[14b9 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa0bf0 gate 1582330447115263700 evaluation starts
[14ba 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa0bf0 signed by 0 principal evaluation starts (used [false])
[14bb 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa0bf0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[14bc 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa0bf0 principal evaluation succeeds for identity 0
[14bd 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa0bf0 gate 1582330447115263700 evaluation succeeds
[14be 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[14bf 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[14c0 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[14c1 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[14c2 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[14c3 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[14c4 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14c5 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14c6 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14c7 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[14c8 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[14c9 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[14ca 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[14cb 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[14cc 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[14cd 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[14ce 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[14cf 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[14d0 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb2900 gate 1582330447116302500 evaluation starts
[14d1 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb2900 signed by 0 principal evaluation starts (used [false])
[14d2 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb2900 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[14d3 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb2900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[14d4 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb2900 principal evaluation fails
[14d5 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb2900 gate 1582330447116302500 evaluation fails
[14d6 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[14d7 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[14d8 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[14d9 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[14da 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[14db 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[14dc 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb3200 gate 1582330447116797800 evaluation starts
[14dd 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb3200 signed by 0 principal evaluation starts (used [false])
[14de 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb3200 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[14df 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb3200 principal evaluation succeeds for identity 0
[14e0 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb3200 gate 1582330447116797800 evaluation succeeds
[14e1 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[14e2 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[14e3 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[14e4 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[14e5 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[14e6 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[14e7 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14e8 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[14e9 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[14ea 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[14eb 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[14ec 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[14ed 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[14ee 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[14ef 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[14f0 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[14f1 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[14f2 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbd310 gate 1582330447118017800 evaluation starts
[14f3 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbd310 signed by 0 principal evaluation starts (used [false])
[14f4 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbd310 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[14f5 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbd310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[14f6 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbd310 principal evaluation fails
[14f7 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbd310 gate 1582330447118017800 evaluation fails
[14f8 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[14f9 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[14fa 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[14fb 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[14fc 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[14fd 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[14fe 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbdc10 gate 1582330447118483600 evaluation starts
[14ff 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbdc10 signed by 0 principal evaluation starts (used [false])
[1500 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbdc10 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1501 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbdc10 principal evaluation succeeds for identity 0
[1502 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbdc10 gate 1582330447118483600 evaluation succeeds
[1503 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1504 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1505 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1506 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1507 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[1508 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[1509 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[150a 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[150b 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[150c 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[150d 02-22 00:14:07.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[150e 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[150f 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1510 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1511 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1512 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1513 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1514 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1515 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1516 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1517 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcdfd0 gate 1582330447125630100 evaluation starts
[1518 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcdfd0 signed by 0 principal evaluation starts (used [false])
[1519 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcdfd0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[151a 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcdfd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[151b 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcdfd0 principal evaluation fails
[151c 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcdfd0 gate 1582330447125630100 evaluation fails
[151d 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[151e 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[151f 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1520 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1521 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1522 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1523 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd88d0 gate 1582330447126206700 evaluation starts
[1524 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd88d0 signed by 0 principal evaluation starts (used [false])
[1525 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd88d0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1526 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd88d0 principal evaluation succeeds for identity 0
[1527 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd88d0 gate 1582330447126206700 evaluation succeeds
[1528 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1529 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[152a 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[152b 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[152c 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[152d 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[152e 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[152f 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[1530 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1531 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1532 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1533 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1534 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1535 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1536 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1537 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1538 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1539 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[153a 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[153b 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef090 gate 1582330447127594700 evaluation starts
[153c 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef090 signed by 0 principal evaluation starts (used [false])
[153d 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef090 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[153e 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[153f 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef090 principal evaluation fails
[1540 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef090 gate 1582330447127594700 evaluation fails
[1541 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1542 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1543 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1544 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1545 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[1546 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1547 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef990 gate 1582330447128119900 evaluation starts
[1548 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef990 signed by 0 principal evaluation starts (used [false])
[1549 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef990 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[154a 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef990 principal evaluation succeeds for identity 0
[154b 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef990 gate 1582330447128119900 evaluation succeeds
[154c 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[154d 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[154e 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[154f 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1550 02-22 00:14:07.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1551 02-22 00:14:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1552 02-22 00:14:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1553 02-22 00:14:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[1554 02-22 00:14:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1555 02-22 00:14:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1556 02-22 00:14:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8846906131893254706 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[1557 02-22 00:14:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8846906131893254706 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[1558 02-22 00:14:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1559 02-22 00:14:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8846906131893254706 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[155a 02-22 00:14:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8846906131893254706 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[155b 02-22 00:14:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[155c 02-22 00:14:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[155d 02-22 00:14:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[155e 02-22 00:14:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[155f 02-22 00:14:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1560 02-22 00:14:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6434525963493178112 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[1561 02-22 00:14:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6434525963493178112 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[1562 02-22 00:14:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[1563 02-22 00:14:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1564 02-22 00:14:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[1565 02-22 00:14:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1566 02-22 00:14:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1567 02-22 00:14:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1568 02-22 00:14:08.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1569 02-22 00:14:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[156a 02-22 00:14:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[156b 02-22 00:14:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[156c 02-22 00:14:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[156d 02-22 00:14:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[156e 02-22 00:14:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[156f 02-22 00:14:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1570 02-22 00:14:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1571 02-22 00:14:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1572 02-22 00:14:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1573 02-22 00:14:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 e5 8c 53 9d 8a 60 5c 0a 8e cf 6c fb 35 2e f9 |...S..`\...l.5..|
00000010 b4 e2 71 57 b1 a2 52 01 23 39 2f 48 57 25 bb 13 |..qW..R.#9/HW%..|
[1574 02-22 00:14:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 4c 3c dc 69 e2 99 21 54 b8 ed 03 |0D. &L<.i..!T...|
00000010 be fe 78 9f 0c 23 24 96 3e 0d 43 53 bc 0f 3b b0 |..x..#$.>.CS..;.|
00000020 9b 8f 1e cd 02 20 04 24 2f fc dc b4 9a 77 f0 c3 |..... .$/....w..|
00000030 0b 5c df 92 64 b5 2a 33 f9 eb 2f 20 be bb 97 d6 |.\..d.*3../ ....|
00000040 9a 2d a9 a2 f7 0c |.-....|
[1575 02-22 00:14:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1576 02-22 00:14:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 99 c1 70 7d 49 fe 28 52 64 35 |0E.!....p}I.(Rd5|
00000010 65 74 97 1e bf 50 71 1c 25 cc 93 59 c0 62 12 eb |et...Pq.%..Y.b..|
00000020 a4 b2 47 65 e3 02 20 2f 9a ce e0 7d 22 db 1b 27 |..Ge.. /...}"..'|
00000030 fc 78 f9 8f 15 d2 c4 4f ff 0d 48 c8 11 ea ac f6 |.x.....O..H.....|
00000040 3f f0 28 22 bc 91 6a |?.("..j|
[1577 02-22 00:14:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1578 02-22 00:14:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[1579 02-22 00:14:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:29
[157a 02-22 00:14:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:29
[157b 02-22 00:14:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[157c 02-22 00:14:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[157d 02-22 00:14:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[157e 02-22 00:14:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[157f 02-22 00:14:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1580 02-22 00:14:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1581 02-22 00:14:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1582 02-22 00:14:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1583 02-22 00:14:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1584 02-22 00:14:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1585 02-22 00:14:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[1586 02-22 00:14:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1587 02-22 00:14:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[1588 02-22 00:14:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1589 02-22 00:14:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[158a 02-22 00:14:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[158b 02-22 00:14:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[158c 02-22 00:14:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[158d 02-22 00:14:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[158e 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[158f 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[1590 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1591 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[1592 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[1593 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1594 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1595 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1596 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1597 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1598 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1599 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[159a 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e e2 77 2c b5 5a 48 73 9b 81 5f a5 49 3e 8b 90 |..w,.ZHs.._.I>..|
00000010 bc 63 4e ad 18 25 24 26 bc 7a fe a8 a0 7a a7 c5 |.cN..%$&.z...z..|
[159b 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 9a 67 e1 15 e7 af cf 08 38 55 |0E.!...g......8U|
00000010 e6 b9 69 c0 53 4f ff 41 36 8c 38 d3 04 e1 1c 8c |..i.SO.A6.8.....|
00000020 8d ff dd 7c 13 02 20 5c c5 69 8f 44 ab bc 79 dc |...|.. \.i.D..y.|
00000030 ff 20 21 38 d6 3e 18 a1 05 31 6c 09 1d ca e2 27 |. !8.>...1l....'|
00000040 06 a9 d2 47 a1 5a ff |...G.Z.|
[159c 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[159d 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c63e0 gate 1582330449303242400 evaluation starts
[159e 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c63e0 signed by 0 principal evaluation starts (used [false])
[159f 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c63e0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[15a0 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c63e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[15a1 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c63e0 principal evaluation fails
[15a2 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c63e0 gate 1582330449303242400 evaluation fails
[15a3 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[15a4 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[15a5 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[15a6 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e e2 77 2c b5 5a 48 73 9b 81 5f a5 49 3e 8b 90 |..w,.ZHs.._.I>..|
00000010 bc 63 4e ad 18 25 24 26 bc 7a fe a8 a0 7a a7 c5 |.cN..%$&.z...z..|
[15a7 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 9a 67 e1 15 e7 af cf 08 38 55 |0E.!...g......8U|
00000010 e6 b9 69 c0 53 4f ff 41 36 8c 38 d3 04 e1 1c 8c |..i.SO.A6.8.....|
00000020 8d ff dd 7c 13 02 20 5c c5 69 8f 44 ab bc 79 dc |...|.. \.i.D..y.|
00000030 ff 20 21 38 d6 3e 18 a1 05 31 6c 09 1d ca e2 27 |. !8.>...1l....'|
00000040 06 a9 d2 47 a1 5a ff |...G.Z.|
[15a8 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[15a9 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c6ce0 gate 1582330449304074700 evaluation starts
[15aa 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c6ce0 signed by 0 principal evaluation starts (used [false])
[15ab 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c6ce0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[15ac 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c6ce0 principal evaluation succeeds for identity 0
[15ad 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c6ce0 gate 1582330449304074700 evaluation succeeds
[15ae 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[15af 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[15b0 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[15b1 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[15b2 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[15b3 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes]}
[15b4 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:28
[15b5 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:28
[15b6 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[15b7 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15b8 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15b9 02-22 00:14:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15ba 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[15bb 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[15bc 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[15bd 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[15be 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[15bf 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[15c0 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[15c1 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[15c2 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[15c3 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[15c4 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[15c5 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[15c6 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15c7 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15c8 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[15c9 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15ca 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[15cb 02-22 00:14:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15cc 02-22 00:14:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[15cd 02-22 00:14:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15ce 02-22 00:14:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[15cf 02-22 00:14:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15d0 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[15d1 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15d2 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[15d3 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[15d4 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[15d5 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[15d6 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[15d7 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[15d8 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[15d9 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[15da 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[15db 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 1c 34 a4 00 a3 d2 4d 45 09 22 50 b4 57 2b e4 |..4....ME."P.W+.|
00000010 ee a5 15 55 c0 f7 44 07 11 8d c9 9e 04 19 10 45 |...U..D........E|
[15dc 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac ca 76 9b 3e 10 31 27 dd ba 2e |0E.!...v.>.1'...|
00000010 6c 33 7f 8f 1e 85 25 b3 c6 ab 3e 45 1f b7 32 a3 |l3....%...>E..2.|
00000020 fd 74 f6 c3 74 02 20 22 48 bc b3 64 79 fe ca 9e |.t..t. "H..dy...|
00000030 23 2c 4f f3 c4 9d 81 d6 7a fc 16 26 9b 75 4a f5 |#,O.....z..&.uJ.|
00000040 fa bf 77 87 ec 3f 5b |..w..?[|
[15dd 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[15de 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ee1e0 gate 1582330449346805700 evaluation starts
[15df 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ee1e0 signed by 0 principal evaluation starts (used [false])
[15e0 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ee1e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[15e1 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ee1e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[15e2 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ee1e0 principal evaluation fails
[15e3 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ee1e0 gate 1582330449346805700 evaluation fails
[15e4 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[15e5 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[15e6 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[15e7 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 1c 34 a4 00 a3 d2 4d 45 09 22 50 b4 57 2b e4 |..4....ME."P.W+.|
00000010 ee a5 15 55 c0 f7 44 07 11 8d c9 9e 04 19 10 45 |...U..D........E|
[15e8 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac ca 76 9b 3e 10 31 27 dd ba 2e |0E.!...v.>.1'...|
00000010 6c 33 7f 8f 1e 85 25 b3 c6 ab 3e 45 1f b7 32 a3 |l3....%...>E..2.|
00000020 fd 74 f6 c3 74 02 20 22 48 bc b3 64 79 fe ca 9e |.t..t. "H..dy...|
00000030 23 2c 4f f3 c4 9d 81 d6 7a fc 16 26 9b 75 4a f5 |#,O.....z..&.uJ.|
00000040 fa bf 77 87 ec 3f 5b |..w..?[|
[15e9 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[15ea 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030eeae0 gate 1582330449348804100 evaluation starts
[15eb 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030eeae0 signed by 0 principal evaluation starts (used [false])
[15ec 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030eeae0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[15ed 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030eeae0 principal evaluation succeeds for identity 0
[15ee 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030eeae0 gate 1582330449348804100 evaluation succeeds
[15ef 02-22 00:14:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[15f0 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[15f1 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[15f2 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[15f3 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[15f4 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes]}
[15f5 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:26
[15f6 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:26
[15f7 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[15f8 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15f9 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15fa 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15fb 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[15fc 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[15fd 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[15fe 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[15ff 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1600 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1601 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1602 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1603 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1604 02-22 00:14:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1605 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1606 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[1607 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1608 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1609 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[160a 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[160b 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[160c 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[160d 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[160e 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[160f 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1610 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes
[1611 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1612 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151019
[1613 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 06827EF3DF92D18E1A9F3DD74266944AF891CD14CF5E2C56DCB16A5F8B4D052A
[1614 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[1615 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[1616 02-22 00:14:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[1617 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[1618 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[1619 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510061801
[161a 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CC5403176129DB9DDA074BEDF67A0E371A774FAEFE205EEFECE3C05C386DA919
[161b 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[161c 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[161d 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[161e 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[161f 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1620 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[1621 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1622 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1623 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1624 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[1625 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1626 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[1627 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[1628 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[1629 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[162a 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[162b 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[162c 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[162e 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[162d 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes
[162f 02-22 00:14:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1630 02-22 00:14:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:595479029249957683 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1631 02-22 00:14:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:595479029249957683 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1632 02-22 00:14:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1633 02-22 00:14:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1634 02-22 00:14:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1635 02-22 00:14:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1636 02-22 00:14:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1637 02-22 00:14:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1638 02-22 00:14:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[1639 02-22 00:14:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[163a 02-22 00:14:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:5333055104802585654 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[163b 02-22 00:14:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:5333055104802585654 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[163c 02-22 00:14:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[163d 02-22 00:14:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[163e 02-22 00:14:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[163f 02-22 00:14:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1640 02-22 00:14:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[1641 02-22 00:14:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1642 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 2c 04 91 af 31 2f fe 05 3e e0 e8 08 2e 4d 60 |.,...1/..>....M`|
00000010 d2 2a 91 2d 2d 11 7e 8b a4 76 06 fb 71 7c 49 2f |.*.--.~..v..q|I/|
[1643 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 6a a2 b4 39 25 ac 37 f0 a1 ee fe |0D. Aj..9%.7....|
00000010 de 8d ff 63 86 48 43 7f 21 cd 44 b2 58 4d ab 22 |...c.HC.!.D.XM."|
00000020 16 d3 66 b2 02 20 06 c4 48 e8 23 82 46 da 3f bc |..f.. ..H.#.F.?.|
00000030 d6 96 39 e8 6e f9 b5 e4 7e ee be d1 36 4b 95 45 |..9.n...~...6K.E|
00000040 92 c5 90 ee d7 2e |......|
[1644 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1645 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 01 77 0f 0a ba 50 96 da df 69 a0 69 |0D. .w...P...i.i|
00000010 60 a1 cb 4f a6 59 c4 95 3a 45 ca 2e 90 98 34 ac |`..O.Y..:E....4.|
00000020 fb 39 75 5b 02 20 28 af eb b2 70 4f e9 df 9d 37 |.9u[. (...pO...7|
00000030 63 6e 71 38 9a d3 45 87 2d e3 3b 5f b0 5b bc ec |cnq8..E.-.;_.[..|
00000040 f0 8b 62 9f c2 8c |..b...|
[1646 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1647 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[1648 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:30
[1649 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:30
[164a 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[164b 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[164c 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[164d 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[164e 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[164f 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1650 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1651 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[1652 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[1653 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[1654 02-22 00:14:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1655 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1656 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1657 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1658 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[1659 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[165a 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[165b 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[165c 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[165d 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[165e 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[165f 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1660 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 83 a2 09 67 3e 7c 9b ea c4 7b af e7 9e 16 b0 |....g>|...{.....|
00000010 ef d1 24 b1 60 fa 28 80 f2 63 d3 5d b5 fc f3 40 |..$.`.(..c.]...@|
[1661 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 b0 9a 8c a7 de 98 c2 23 0f 10 |0E.!.........#..|
00000010 aa f1 46 1b 85 0c e2 42 4f 2c a5 8a 25 16 24 cb |..F....BO,..%.$.|
00000020 74 b1 97 0f c1 02 20 2e 6d b9 b5 61 0b 35 bc ec |t..... .m..a.5..|
00000030 4d e5 81 21 66 58 4c c4 d6 70 50 55 ab 20 f1 2a |M..!fXL..pPU. .*|
00000040 86 db fe eb 04 71 7a |.....qz|
[1662 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1663 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031455e0 gate 1582330450306001400 evaluation starts
[1664 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031455e0 signed by 0 principal evaluation starts (used [false])
[1665 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031455e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1666 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031455e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1667 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031455e0 principal evaluation fails
[1668 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031455e0 gate 1582330450306001400 evaluation fails
[1669 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[166a 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[166b 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[166c 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 83 a2 09 67 3e 7c 9b ea c4 7b af e7 9e 16 b0 |....g>|...{.....|
00000010 ef d1 24 b1 60 fa 28 80 f2 63 d3 5d b5 fc f3 40 |..$.`.(..c.]...@|
[166d 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 b0 9a 8c a7 de 98 c2 23 0f 10 |0E.!.........#..|
00000010 aa f1 46 1b 85 0c e2 42 4f 2c a5 8a 25 16 24 cb |..F....BO,..%.$.|
00000020 74 b1 97 0f c1 02 20 2e 6d b9 b5 61 0b 35 bc ec |t..... .m..a.5..|
00000030 4d e5 81 21 66 58 4c c4 d6 70 50 55 ab 20 f1 2a |M..!fXL..pPU. .*|
00000040 86 db fe eb 04 71 7a |.....qz|
[166e 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[166f 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003145ee0 gate 1582330450307086800 evaluation starts
[1670 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003145ee0 signed by 0 principal evaluation starts (used [false])
[1671 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003145ee0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1672 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003145ee0 principal evaluation succeeds for identity 0
[1673 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003145ee0 gate 1582330450307086800 evaluation succeeds
[1674 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1675 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1676 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1677 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1678 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes
[1679 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes]}
[167a 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:27
[167b 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:27
[167c 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[167d 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[167e 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[167f 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1680 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[1681 02-22 00:14:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1682 02-22 00:14:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1683 02-22 00:14:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1684 02-22 00:14:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[1685 02-22 00:14:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[1686 02-22 00:14:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[1687 02-22 00:14:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1688 02-22 00:14:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[1689 02-22 00:14:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:16605055525553934975 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[168a 02-22 00:14:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[168c 02-22 00:14:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:9361656904413670336 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[168b 02-22 00:14:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:16605055525553934975 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[168d 02-22 00:14:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[168e 02-22 00:14:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[168f 02-22 00:14:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:6571313216965807344 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[1690 02-22 00:14:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:6571313216965807344 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1691 02-22 00:14:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:9361656904413670336 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1693 02-22 00:14:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1692 02-22 00:14:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1694 02-22 00:14:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:1457086579845423110 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1695 02-22 00:14:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:1457086579845423110 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1696 02-22 00:14:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1457086579845423110 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1697 02-22 00:14:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1698 02-22 00:14:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1699 02-22 00:14:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[169a 02-22 00:14:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[169b 02-22 00:14:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[169c 02-22 00:14:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[169d 02-22 00:14:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[169e 02-22 00:14:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[169f 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[16a0 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[16a1 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[16a2 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[16a3 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[16a4 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[16a5 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[16a6 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[16a7 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[16a8 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[16a9 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[16aa 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[16ab 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 4f e6 5c 48 78 df a6 9e 71 b7 85 21 50 d9 22 |.O.\Hx...q..!P."|
00000010 0e f1 72 3f 69 7d a0 8d 82 f9 2f 9c 36 82 98 16 |..r?i}..../.6...|
[16ac 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 06 6b 34 92 e5 97 19 11 be e9 23 |0D. M.k4.......#|
00000010 da ac f3 99 64 ab b5 9a 16 9f 7a 1a 3f 03 3f f3 |....d.....z.?.?.|
00000020 02 46 92 ce 02 20 39 4e 2c ee 93 ac b0 68 2d a6 |.F... 9N,....h-.|
00000030 e7 3a 98 46 7d a9 ae 50 9e d5 b8 f9 4f 32 d4 ef |.:.F}..P....O2..|
00000040 7b ad 63 32 32 0d |{.c22.|
[16ad 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[16ae 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200f20 gate 1582330450362807400 evaluation starts
[16af 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200f20 signed by 0 principal evaluation starts (used [false])
[16b0 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200f20 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[16b1 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[16b2 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200f20 principal evaluation fails
[16b3 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200f20 gate 1582330450362807400 evaluation fails
[16b4 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[16b5 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[16b6 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[16b7 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 4f e6 5c 48 78 df a6 9e 71 b7 85 21 50 d9 22 |.O.\Hx...q..!P."|
00000010 0e f1 72 3f 69 7d a0 8d 82 f9 2f 9c 36 82 98 16 |..r?i}..../.6...|
[16b8 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 06 6b 34 92 e5 97 19 11 be e9 23 |0D. M.k4.......#|
00000010 da ac f3 99 64 ab b5 9a 16 9f 7a 1a 3f 03 3f f3 |....d.....z.?.?.|
00000020 02 46 92 ce 02 20 39 4e 2c ee 93 ac b0 68 2d a6 |.F... 9N,....h-.|
00000030 e7 3a 98 46 7d a9 ae 50 9e d5 b8 f9 4f 32 d4 ef |.:.F}..P....O2..|
00000040 7b ad 63 32 32 0d |{.c22.|
[16b9 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[16ba 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003201820 gate 1582330450363365300 evaluation starts
[16bb 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003201820 signed by 0 principal evaluation starts (used [false])
[16bc 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003201820 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[16bd 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003201820 principal evaluation succeeds for identity 0
[16be 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003201820 gate 1582330450363365300 evaluation succeeds
[16bf 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[16c0 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[16c1 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[16c2 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[16c3 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[16c4 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes]}
[16c5 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:29
[16c6 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:29
[16c7 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[16c8 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[16c9 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[16ca 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[16cb 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[16cc 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[16cd 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[16ce 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[16cf 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[16d0 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[16d1 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[16d2 02-22 00:14:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[16d3 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16605055525553934975 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[16d4 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16605055525553934975 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[16d5 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[16d6 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15101A
[16d7 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DD500054A8A51A6878057F9E8597FD029DD9A59413DCB6883A3661265643AD92
[16d8 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[16d9 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[16db 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[16da 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9361656904413670336 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[16dc 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9361656904413670336 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[16df 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9361656904413670336 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[16e0 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[16dd 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[16e1 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[16de 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[16e2 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[16e3 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[16e4 02-22 00:14:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[16e5 02-22 00:14:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[16e6 02-22 00:14:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[16e7 02-22 00:14:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[16e8 02-22 00:14:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6571313216965807344 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[16e9 02-22 00:14:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6571313216965807344 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[16ea 02-22 00:14:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[16eb 02-22 00:14:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[16ec 02-22 00:14:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[16ed 02-22 00:14:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[16ee 02-22 00:14:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[16ef 02-22 00:14:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[16f0 02-22 00:14:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 50 00 54 a8 a5 1a 68 78 05 7f 9e 85 97 fd 02 |.P.T...hx.......|
00000010 9d d9 a5 94 13 dc b6 88 3a 36 61 26 56 43 ad 92 |........:6a&VC..|
[16f1 02-22 00:14:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 4b ce 78 61 59 2e 7c ae 7e f8 |0D. x.K.xaY.|.~.|
00000010 bc 01 ab 4f 40 27 a1 dc fb c4 26 bb c4 3e b7 27 |...O@'....&..>.'|
00000020 af d3 a2 46 02 20 47 a1 5d 89 60 5f f6 00 a5 2d |...F. G.].`_...-|
00000030 5b f5 c0 9e 0f 83 a9 32 de c3 d8 99 3e 15 51 aa |[......2....>.Q.|
00000040 19 34 9e 62 85 d6 |.4.b..|
[16f2 02-22 00:14:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[16f3 02-22 00:14:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 27 ad 96 fd 24 e1 c3 f2 a0 91 |0E.!..'...$.....|
00000010 a5 d8 60 a1 7e 9f 91 04 4e 77 00 8a 8d b2 aa ee |..`.~...Nw......|
00000020 67 6b a9 30 3a 02 20 08 b1 73 16 fa a6 df 83 ae |gk.0:. ..s......|
00000030 fa 1f 70 d2 b9 9c 35 8f d4 5f f7 e1 c5 0f 8f 24 |..p...5.._.....$|
00000040 8d d0 3d 30 19 8b 67 |..=0..g|
[16f4 02-22 00:14:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[16f5 02-22 00:14:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[16f6 02-22 00:14:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[16f7 02-22 00:14:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[16f8 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[16f9 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[16fa 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[16fb 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[16fc 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[16fd 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[16fe 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[16ff 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1700 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1701 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1702 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1703 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1704 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 83 a2 09 67 3e 7c 9b ea c4 7b af e7 9e 16 b0 |....g>|...{.....|
00000010 ef d1 24 b1 60 fa 28 80 f2 63 d3 5d b5 fc f3 40 |..$.`.(..c.]...@|
[1705 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 b0 9a 8c a7 de 98 c2 23 0f 10 |0E.!.........#..|
00000010 aa f1 46 1b 85 0c e2 42 4f 2c a5 8a 25 16 24 cb |..F....BO,..%.$.|
00000020 74 b1 97 0f c1 02 20 2e 6d b9 b5 61 0b 35 bc ec |t..... .m..a.5..|
00000030 4d e5 81 21 66 58 4c c4 d6 70 50 55 ab 20 f1 2a |M..!fXL..pPU. .*|
00000040 86 db fe eb 04 71 7a |.....qz|
[1706 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1707 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327d470 gate 1582330450434533000 evaluation starts
[1708 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327d470 signed by 0 principal evaluation starts (used [false])
[1709 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327d470 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[170a 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327d470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[170b 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327d470 principal evaluation fails
[170c 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327d470 gate 1582330450434533000 evaluation fails
[170d 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[170e 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[170f 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1710 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 83 a2 09 67 3e 7c 9b ea c4 7b af e7 9e 16 b0 |....g>|...{.....|
00000010 ef d1 24 b1 60 fa 28 80 f2 63 d3 5d b5 fc f3 40 |..$.`.(..c.]...@|
[1711 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 b0 9a 8c a7 de 98 c2 23 0f 10 |0E.!.........#..|
00000010 aa f1 46 1b 85 0c e2 42 4f 2c a5 8a 25 16 24 cb |..F....BO,..%.$.|
00000020 74 b1 97 0f c1 02 20 2e 6d b9 b5 61 0b 35 bc ec |t..... .m..a.5..|
00000030 4d e5 81 21 66 58 4c c4 d6 70 50 55 ab 20 f1 2a |M..!fXL..pPU. .*|
00000040 86 db fe eb 04 71 7a |.....qz|
[1712 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1713 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327dd70 gate 1582330450439301400 evaluation starts
[1714 02-22 00:14:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327dd70 signed by 0 principal evaluation starts (used [false])
[1715 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327dd70 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1716 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327dd70 principal evaluation succeeds for identity 0
[1717 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327dd70 gate 1582330450439301400 evaluation succeeds
[1718 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1719 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[171a 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[171b 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[171c 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes
[171d 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[171e 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[171f 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 50 00 54 a8 a5 1a 68 78 05 7f 9e 85 97 fd 02 |.P.T...hx.......|
00000010 9d d9 a5 94 13 dc b6 88 3a 36 61 26 56 43 ad 92 |........:6a&VC..|
[1720 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 4b ce 78 61 59 2e 7c ae 7e f8 |0D. x.K.xaY.|.~.|
00000010 bc 01 ab 4f 40 27 a1 dc fb c4 26 bb c4 3e b7 27 |...O@'....&..>.'|
00000020 af d3 a2 46 02 20 47 a1 5d 89 60 5f f6 00 a5 2d |...F. G.].`_...-|
00000030 5b f5 c0 9e 0f 83 a9 32 de c3 d8 99 3e 15 51 aa |[......2....>.Q.|
00000040 19 34 9e 62 85 d6 |.4.b..|
[1721 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[1722 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[1723 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1724 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1725 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[1726 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 2c 04 91 af 31 2f fe 05 3e e0 e8 08 2e 4d 60 |.,...1/..>....M`|
00000010 d2 2a 91 2d 2d 11 7e 8b a4 76 06 fb 71 7c 49 2f |.*.--.~..v..q|I/|
[1727 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 6a a2 b4 39 25 ac 37 f0 a1 ee fe |0D. Aj..9%.7....|
00000010 de 8d ff 63 86 48 43 7f 21 cd 44 b2 58 4d ab 22 |...c.HC.!.D.XM."|
00000020 16 d3 66 b2 02 20 06 c4 48 e8 23 82 46 da 3f bc |..f.. ..H.#.F.?.|
00000030 d6 96 39 e8 6e f9 b5 e4 7e ee be d1 36 4b 95 45 |..9.n...~...6K.E|
00000040 92 c5 90 ee d7 2e |......|
[1728 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes
[1729 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[172a 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[172b 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[172c 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[172d 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 50 00 54 a8 a5 1a 68 78 05 7f 9e 85 97 fd 02 |.P.T...hx.......|
00000010 9d d9 a5 94 13 dc b6 88 3a 36 61 26 56 43 ad 92 |........:6a&VC..|
[172e 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 4b ce 78 61 59 2e 7c ae 7e f8 |0D. x.K.xaY.|.~.|
00000010 bc 01 ab 4f 40 27 a1 dc fb c4 26 bb c4 3e b7 27 |...O@'....&..>.'|
00000020 af d3 a2 46 02 20 47 a1 5d 89 60 5f f6 00 a5 2d |...F. G.].`_...-|
00000030 5b f5 c0 9e 0f 83 a9 32 de c3 d8 99 3e 15 51 aa |[......2....>.Q.|
00000040 19 34 9e 62 85 d6 |.4.b..|
[172f 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1730 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[1731 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:26 , Envelope: 83 bytes, Signature: 70 bytes
[1732 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1733 02-22 00:14:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1734 02-22 00:14:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 2c 04 91 af 31 2f fe 05 3e e0 e8 08 2e 4d 60 |.,...1/..>....M`|
00000010 d2 2a 91 2d 2d 11 7e 8b a4 76 06 fb 71 7c 49 2f |.*.--.~..v..q|I/|
[1735 02-22 00:14:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 6a a2 b4 39 25 ac 37 f0 a1 ee fe |0D. Aj..9%.7....|
00000010 de 8d ff 63 86 48 43 7f 21 cd 44 b2 58 4d ab 22 |...c.HC.!.D.XM."|
00000020 16 d3 66 b2 02 20 06 c4 48 e8 23 82 46 da 3f bc |..f.. ..H.#.F.?.|
00000030 d6 96 39 e8 6e f9 b5 e4 7e ee be d1 36 4b 95 45 |..9.n...~...6K.E|
00000040 92 c5 90 ee d7 2e |......|
[1736 02-22 00:14:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes
[1737 02-22 00:14:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1738 02-22 00:14:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[1739 02-22 00:14:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[173a 02-22 00:14:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[173b 02-22 00:14:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[173c 02-22 00:14:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[173d 02-22 00:14:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[173e 02-22 00:14:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[173f 02-22 00:14:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1740 02-22 00:14:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 4f e6 5c 48 78 df a6 9e 71 b7 85 21 50 d9 22 |.O.\Hx...q..!P."|
00000010 0e f1 72 3f 69 7d a0 8d 82 f9 2f 9c 36 82 98 16 |..r?i}..../.6...|
[1741 02-22 00:14:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 06 6b 34 92 e5 97 19 11 be e9 23 |0D. M.k4.......#|
00000010 da ac f3 99 64 ab b5 9a 16 9f 7a 1a 3f 03 3f f3 |....d.....z.?.?.|
00000020 02 46 92 ce 02 20 39 4e 2c ee 93 ac b0 68 2d a6 |.F... 9N,....h-.|
00000030 e7 3a 98 46 7d a9 ae 50 9e d5 b8 f9 4f 32 d4 ef |.:.F}..P....O2..|
00000040 7b ad 63 32 32 0d |{.c22.|
[1742 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1743 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be400 gate 1582330450461124400 evaluation starts
[1744 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be400 signed by 0 principal evaluation starts (used [false])
[1745 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be400 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1746 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1747 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be400 principal evaluation fails
[1748 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be400 gate 1582330450461124400 evaluation fails
[1749 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[174a 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[174b 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[174c 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 4f e6 5c 48 78 df a6 9e 71 b7 85 21 50 d9 22 |.O.\Hx...q..!P."|
00000010 0e f1 72 3f 69 7d a0 8d 82 f9 2f 9c 36 82 98 16 |..r?i}..../.6...|
[174d 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 06 6b 34 92 e5 97 19 11 be e9 23 |0D. M.k4.......#|
00000010 da ac f3 99 64 ab b5 9a 16 9f 7a 1a 3f 03 3f f3 |....d.....z.?.?.|
00000020 02 46 92 ce 02 20 39 4e 2c ee 93 ac b0 68 2d a6 |.F... 9N,....h-.|
00000030 e7 3a 98 46 7d a9 ae 50 9e d5 b8 f9 4f 32 d4 ef |.:.F}..P....O2..|
00000040 7b ad 63 32 32 0d |{.c22.|
[174e 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[174f 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032bed00 gate 1582330450465112400 evaluation starts
[1750 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032bed00 signed by 0 principal evaluation starts (used [false])
[1751 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032bed00 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1752 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032bed00 principal evaluation succeeds for identity 0
[1753 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032bed00 gate 1582330450465112400 evaluation succeeds
[1754 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1755 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1756 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1757 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1758 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[1759 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[175a 02-22 00:14:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[175b 02-22 00:14:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[175c 02-22 00:14:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[175d 02-22 00:14:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[175e 02-22 00:14:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[175f 02-22 00:14:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1760 02-22 00:14:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[1761 02-22 00:14:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1762 02-22 00:14:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[1763 02-22 00:14:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1764 02-22 00:14:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[1765 02-22 00:14:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1766 02-22 00:14:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[1767 02-22 00:14:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1768 02-22 00:14:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1769 02-22 00:14:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[176a 02-22 00:14:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[176b 02-22 00:14:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[176c 02-22 00:14:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[176d 02-22 00:14:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[176e 02-22 00:14:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[176f 02-22 00:14:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1770 02-22 00:14:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1771 02-22 00:14:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1772 02-22 00:14:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00329f4a0 gate 1582330451128338700 evaluation starts
[1773 02-22 00:14:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00329f4a0 signed by 0 principal evaluation starts (used [false])
[1774 02-22 00:14:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00329f4a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1775 02-22 00:14:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00329f4a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1776 02-22 00:14:11.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00329f4a0 principal evaluation fails
[1777 02-22 00:14:11.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00329f4a0 gate 1582330451128338700 evaluation fails
[1778 02-22 00:14:11.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1779 02-22 00:14:11.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[177a 02-22 00:14:11.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[177b 02-22 00:14:11.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[177c 02-22 00:14:11.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[177d 02-22 00:14:11.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[177e 02-22 00:14:11.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00329fda0 gate 1582330451138632200 evaluation starts
[177f 02-22 00:14:11.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00329fda0 signed by 0 principal evaluation starts (used [false])
[1780 02-22 00:14:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00329fda0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1781 02-22 00:14:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00329fda0 principal evaluation succeeds for identity 0
[1782 02-22 00:14:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00329fda0 gate 1582330451138632200 evaluation succeeds
[1783 02-22 00:14:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1784 02-22 00:14:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1785 02-22 00:14:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1786 02-22 00:14:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1787 02-22 00:14:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[1788 02-22 00:14:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[1789 02-22 00:14:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[178a 02-22 00:14:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[178b 02-22 00:14:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[178c 02-22 00:14:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[178d 02-22 00:14:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[178e 02-22 00:14:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[178f 02-22 00:14:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1790 02-22 00:14:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1791 02-22 00:14:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1792 02-22 00:14:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1793 02-22 00:14:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1795 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1794 02-22 00:14:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1796 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[1798 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1799 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1797 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[179a 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12732769191944320494 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[179b 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12732769191944320494 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[179c 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[179d 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[179e 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003340560 gate 1582330451163836800 evaluation starts
[179f 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003340560 signed by 0 principal evaluation starts (used [false])
[17a0 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003340560 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[17a1 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003340560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[17a2 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003340560 principal evaluation fails
[17a3 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003340560 gate 1582330451163836800 evaluation fails
[17a4 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[17a5 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[17a6 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[17a7 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[17a8 02-22 00:14:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[17a9 02-22 00:14:11.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[17aa 02-22 00:14:11.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003340e60 gate 1582330451171345700 evaluation starts
[17ab 02-22 00:14:11.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003340e60 signed by 0 principal evaluation starts (used [false])
[17ac 02-22 00:14:11.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003340e60 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[17ad 02-22 00:14:11.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003340e60 principal evaluation succeeds for identity 0
[17ae 02-22 00:14:11.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003340e60 gate 1582330451171345700 evaluation succeeds
[17af 02-22 00:14:11.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[17b0 02-22 00:14:11.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[17b1 02-22 00:14:11.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[17b2 02-22 00:14:11.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[17b3 02-22 00:14:11.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[17b4 02-22 00:14:11.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[17b5 02-22 00:14:11.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17b6 02-22 00:14:11.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17b7 02-22 00:14:11.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17b8 02-22 00:14:11.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[17b9 02-22 00:14:11.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[17ba 02-22 00:14:11.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[17bb 02-22 00:14:11.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[17bc 02-22 00:14:11.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[17bd 02-22 00:14:11.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[17be 02-22 00:14:11.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[17bf 02-22 00:14:11.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[17c0 02-22 00:14:11.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[17c1 02-22 00:14:11.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003364b70 gate 1582330451192648100 evaluation starts
[17c2 02-22 00:14:11.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003364b70 signed by 0 principal evaluation starts (used [false])
[17c3 02-22 00:14:11.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003364b70 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[17c4 02-22 00:14:11.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003364b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[17c5 02-22 00:14:11.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003364b70 principal evaluation fails
[17c6 02-22 00:14:11.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003364b70 gate 1582330451192648100 evaluation fails
[17c7 02-22 00:14:11.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[17c8 02-22 00:14:11.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[17c9 02-22 00:14:11.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[17ca 02-22 00:14:11.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[17cb 02-22 00:14:11.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[17cc 02-22 00:14:11.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[17cd 02-22 00:14:11.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003365470 gate 1582330451200876800 evaluation starts
[17ce 02-22 00:14:11.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003365470 signed by 0 principal evaluation starts (used [false])
[17cf 02-22 00:14:11.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003365470 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[17d0 02-22 00:14:11.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003365470 principal evaluation succeeds for identity 0
[17d1 02-22 00:14:11.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003365470 gate 1582330451200876800 evaluation succeeds
[17d2 02-22 00:14:11.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[17d3 02-22 00:14:11.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[17d4 02-22 00:14:11.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[17d5 02-22 00:14:11.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[17d6 02-22 00:14:11.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[17d7 02-22 00:14:11.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[17d8 02-22 00:14:11.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17d9 02-22 00:14:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[17da 02-22 00:14:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[17db 02-22 00:14:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[17dc 02-22 00:14:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[17dd 02-22 00:14:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[17de 02-22 00:14:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[17df 02-22 00:14:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[17e0 02-22 00:14:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[17e1 02-22 00:14:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[17e2 02-22 00:14:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[17e3 02-22 00:14:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003375580 gate 1582330451217756600 evaluation starts
[17e4 02-22 00:14:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003375580 signed by 0 principal evaluation starts (used [false])
[17e5 02-22 00:14:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003375580 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[17e6 02-22 00:14:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003375580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[17e7 02-22 00:14:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003375580 principal evaluation fails
[17e8 02-22 00:14:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003375580 gate 1582330451217756600 evaluation fails
[17e9 02-22 00:14:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[17ea 02-22 00:14:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[17eb 02-22 00:14:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[17ec 02-22 00:14:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[17ed 02-22 00:14:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[17ee 02-22 00:14:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[17ef 02-22 00:14:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003375e80 gate 1582330451227454700 evaluation starts
[17f0 02-22 00:14:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003375e80 signed by 0 principal evaluation starts (used [false])
[17f1 02-22 00:14:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003375e80 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[17f2 02-22 00:14:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003375e80 principal evaluation succeeds for identity 0
[17f3 02-22 00:14:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003375e80 gate 1582330451227454700 evaluation succeeds
[17f4 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[17f5 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[17f6 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[17f7 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[17f8 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[17f9 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[17fa 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[17fb 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[17fc 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[17fd 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[17fe 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[17ff 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[1800 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1801 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1802 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1803 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1804 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1805 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1806 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1807 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1808 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1809 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[180a 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[180b 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4ed0 gate 1582330451234763200 evaluation starts
[180c 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4ed0 signed by 0 principal evaluation starts (used [false])
[180d 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4ed0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[180e 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[180f 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4ed0 principal evaluation fails
[1810 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4ed0 gate 1582330451234763200 evaluation fails
[1811 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1812 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1813 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1814 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1815 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1816 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1817 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a57d0 gate 1582330451235193100 evaluation starts
[1818 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a57d0 signed by 0 principal evaluation starts (used [false])
[1819 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a57d0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[181a 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a57d0 principal evaluation succeeds for identity 0
[181b 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a57d0 gate 1582330451235193100 evaluation succeeds
[181c 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[181d 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[181e 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[181f 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1820 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1821 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1822 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1823 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1824 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1825 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1826 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1827 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1828 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1829 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[182a 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[182b 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bd230 gate 1582330451236021300 evaluation starts
[182c 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bd230 signed by 0 principal evaluation starts (used [false])
[182d 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bd230 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[182e 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bd230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[182f 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bd230 principal evaluation fails
[1830 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bd230 gate 1582330451236021300 evaluation fails
[1831 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1832 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1833 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1834 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1835 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[1836 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1837 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bdb30 gate 1582330451238690000 evaluation starts
[1838 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bdb30 signed by 0 principal evaluation starts (used [false])
[1839 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bdb30 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[183a 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bdb30 principal evaluation succeeds for identity 0
[183b 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033bdb30 gate 1582330451238690000 evaluation succeeds
[183c 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[183d 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[183e 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[183f 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1840 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1841 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12732769191944320494 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[1842 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12732769191944320494 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[1843 02-22 00:14:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1844 02-22 00:14:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[1845 02-22 00:14:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1846 02-22 00:14:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1847 02-22 00:14:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1848 02-22 00:14:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3720591641744128494 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[1849 02-22 00:14:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3720591641744128494 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[184a 02-22 00:14:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[184b 02-22 00:14:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[184c 02-22 00:14:12.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[184d 02-22 00:14:12.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[184e 02-22 00:14:12.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[184f 02-22 00:14:12.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1850 02-22 00:14:12.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1851 02-22 00:14:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[1852 02-22 00:14:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[1853 02-22 00:14:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1854 02-22 00:14:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1855 02-22 00:14:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1856 02-22 00:14:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1857 02-22 00:14:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:12324089534853106431 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1858 02-22 00:14:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:12324089534853106431 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1859 02-22 00:14:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[185a 02-22 00:14:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[185b 02-22 00:14:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[185c 02-22 00:14:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[185d 02-22 00:14:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[185e 02-22 00:14:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[185f 02-22 00:14:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[1860 02-22 00:14:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1861 02-22 00:14:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:4327374022732704056 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1862 02-22 00:14:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:4327374022732704056 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1863 02-22 00:14:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[1864 02-22 00:14:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1865 02-22 00:14:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[1866 02-22 00:14:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1867 02-22 00:14:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[1868 02-22 00:14:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1869 02-22 00:14:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 3a dd dd d3 a8 88 73 7a 5d 2f 0e cd 66 4a 9b |*:.....sz]/..fJ.|
00000010 d8 9f 8c 88 d4 e7 aa 04 1f c2 36 7f 6b 47 7f 23 |..........6.kG.#|
[186a 02-22 00:14:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 17 d0 69 ec 5f 81 92 d8 31 59 3c 3e |0D. ..i._...1Y<>|
00000010 a7 a0 7a 41 e1 52 fb 44 7d 88 54 e1 76 89 e9 23 |..zA.R.D}.T.v..#|
00000020 ba 50 f5 dd 02 20 5d c3 ee d9 50 d7 79 bc ca 13 |.P... ]...P.y...|
00000030 3b 8a c4 26 e7 61 98 2a 56 72 b4 2e 80 2d 77 94 |;..&.a.*Vr...-w.|
00000040 39 cd f7 d4 38 a8 |9...8.|
[186b 02-22 00:14:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[186c 02-22 00:14:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 53 9b b7 50 44 38 1e af d7 d8 |0E.!..S..PD8....|
00000010 30 23 54 59 17 9b 53 52 0e b8 94 77 1f 5f b0 91 |0#TY..SR...w._..|
00000020 07 ae c3 bb 25 02 20 33 aa cc 73 df 42 a6 d9 62 |....%. 3..s.B..b|
00000030 38 fa 87 2d 28 66 3c f6 b3 a0 52 df 56 65 0b da |8..-(f<...R.Ve..|
00000040 dd 6c 25 06 0e 28 b5 |.l%..(.|
[186d 02-22 00:14:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[186e 02-22 00:14:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[186f 02-22 00:14:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:32
[1870 02-22 00:14:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:32
[1871 02-22 00:14:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[1872 02-22 00:14:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1873 02-22 00:14:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1874 02-22 00:14:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[1875 02-22 00:14:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1876 02-22 00:14:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1877 02-22 00:14:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[1878 02-22 00:14:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[1879 02-22 00:14:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[187a 02-22 00:14:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[187b 02-22 00:14:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[187c 02-22 00:14:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[187d 02-22 00:14:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[187e 02-22 00:14:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[187f 02-22 00:14:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1880 02-22 00:14:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 53 4b ec 99 f1 72 04 f5 e8 3a a6 c4 f0 f3 f0 |.SK...r...:.....|
00000010 bf 45 53 6b 68 39 18 b2 35 52 09 7d 62 0a e9 3b |.ESkh9..5R.}b..;|
[1881 02-22 00:14:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 53 b9 90 c2 77 63 96 8b ac f8 33 |0D. fS...wc....3|
00000010 47 8c 5a 6f 02 79 d2 14 84 0b 0c c6 79 b2 e9 ff |G.Zo.y......y...|
00000020 10 d1 6b d1 02 20 0a 74 de da c3 f8 83 f0 97 2b |..k.. .t.......+|
00000030 81 3b eb 35 8d cf 42 0c 89 45 14 ab 69 b2 95 0f |.;.5..B..E..i...|
00000040 a4 89 ce f5 78 66 |....xf|
[1882 02-22 00:14:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1883 02-22 00:14:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 1c 6b 8f c6 83 7a 64 f3 74 2c 3e |0D. ..k...zd.t,>|
00000010 65 ce 0f 7c 01 5d ca dc 71 ab 0d 1c 30 55 2b 0e |e..|.]..q...0U+.|
00000020 41 3d 7a 54 02 20 19 71 11 54 7f 51 9d d5 ca 86 |A=zT. .q.T.Q....|
00000030 5b 79 47 7c d2 09 5f 42 2e 69 b7 c4 b9 8e bb a0 |[yG|.._B.i......|
00000040 bc 7c 12 a9 2f 41 |.|../A|
[1884 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1885 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU got old alive message about alive peer Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 lastAliveTS: 1582330413427424700, 32 but got ts: inc_num:1582330413427424700 seq_num:31
[1886 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1887 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1888 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes
[1889 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes
[188a 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[188b 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes
[188c 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[188d 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[188e 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[188f 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1890 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1891 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1892 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1893 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1894 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 48 fb 04 e8 31 46 0f e8 31 a5 8e 2a 85 e7 55 |.H...1F..1..*..U|
00000010 c2 ea 3d cb e3 ce 27 b4 7f 0a 12 f7 35 5e 5e c7 |..=...'.....5^^.|
[1895 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 bf 13 5d 74 ba e1 1f bd d9 ad |0E.!....]t......|
00000010 f5 7e 49 24 65 c9 ee f6 88 3b 20 3b a5 a1 8e 62 |.~I$e....; ;...b|
00000020 bf 4b f4 dd 2d 02 20 75 53 21 d9 3f 5e 2b 23 44 |.K..-. uS!.?^+#D|
00000030 d0 c7 cd 8a b8 0a d7 44 6b 79 cc 29 18 14 7d a8 |.......Dky.)..}.|
00000040 f7 49 42 fe 4b 05 2c |.IB.K.,|
[1896 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1897 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034686b0 gate 1582330454313836900 evaluation starts
[1898 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034686b0 signed by 0 principal evaluation starts (used [false])
[1899 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034686b0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[189a 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034686b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[189b 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034686b0 principal evaluation fails
[189c 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034686b0 gate 1582330454313836900 evaluation fails
[189d 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[189e 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[189f 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[18a0 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 48 fb 04 e8 31 46 0f e8 31 a5 8e 2a 85 e7 55 |.H...1F..1..*..U|
00000010 c2 ea 3d cb e3 ce 27 b4 7f 0a 12 f7 35 5e 5e c7 |..=...'.....5^^.|
[18a1 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 bf 13 5d 74 ba e1 1f bd d9 ad |0E.!....]t......|
00000010 f5 7e 49 24 65 c9 ee f6 88 3b 20 3b a5 a1 8e 62 |.~I$e....; ;...b|
00000020 bf 4b f4 dd 2d 02 20 75 53 21 d9 3f 5e 2b 23 44 |.K..-. uS!.?^+#D|
00000030 d0 c7 cd 8a b8 0a d7 44 6b 79 cc 29 18 14 7d a8 |.......Dky.)..}.|
00000040 f7 49 42 fe 4b 05 2c |.IB.K.,|
[18a2 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[18a3 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468fb0 gate 1582330454314316700 evaluation starts
[18a4 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468fb0 signed by 0 principal evaluation starts (used [false])
[18a5 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468fb0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[18a6 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468fb0 principal evaluation succeeds for identity 0
[18a7 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468fb0 gate 1582330454314316700 evaluation succeeds
[18a8 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[18a9 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[18aa 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[18ab 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[18ac 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes
[18ad 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes]}
[18ae 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:30
[18af 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:30
[18b0 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[18b1 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18b2 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18b3 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18b4 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18b5 02-22 00:14:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18b6 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18b7 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[18b8 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18b9 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[18ba 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18bb 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18bc 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18bd 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18c0 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[18c1 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18c2 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18c3 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[18c4 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes
[18c5 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18be 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[18c6 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18c7 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes
[18c8 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18bf 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[18c9 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18ca 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[18cb 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[18cd 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[18ce 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18cc 02-22 00:14:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18cf 02-22 00:14:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[18d0 02-22 00:14:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18d1 02-22 00:14:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[18d2 02-22 00:14:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[18d3 02-22 00:14:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[18d4 02-22 00:14:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[18d5 02-22 00:14:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[18d6 02-22 00:14:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[18d7 02-22 00:14:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[18d8 02-22 00:14:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[18d9 02-22 00:14:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[18da 02-22 00:14:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 f2 9c bd fb a6 aa 43 ea a3 64 02 85 28 e3 3f |.......C..d..(.?|
00000010 e5 d9 cd 18 79 a4 4f 25 c5 94 35 a1 a9 ff 39 ad |....y.O%..5...9.|
[18db 02-22 00:14:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 39 67 d9 ad 1d 55 a3 d0 8c a9 0a |0D. .9g...U.....|
00000010 29 ce 79 56 c6 3a da 41 ad 48 a7 ae c7 30 00 02 |).yV.:.A.H...0..|
00000020 5f 6b 73 1b 02 20 79 70 f6 b9 93 72 a4 85 a3 37 |_ks.. yp...r...7|
00000030 6f 5e 0c 74 db 75 2b ac 17 99 fa d6 33 ec 81 73 |o^.t.u+.....3..s|
00000040 54 5d 70 00 09 c2 |T]p...|
[18dc 02-22 00:14:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[18dd 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ac470 gate 1582330454340549600 evaluation starts
[18de 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ac470 signed by 0 principal evaluation starts (used [false])
[18df 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ac470 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[18e0 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ac470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[18e1 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ac470 principal evaluation fails
[18e2 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ac470 gate 1582330454340549600 evaluation fails
[18e3 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[18e4 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[18e5 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[18e6 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 f2 9c bd fb a6 aa 43 ea a3 64 02 85 28 e3 3f |.......C..d..(.?|
00000010 e5 d9 cd 18 79 a4 4f 25 c5 94 35 a1 a9 ff 39 ad |....y.O%..5...9.|
[18e7 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 39 67 d9 ad 1d 55 a3 d0 8c a9 0a |0D. .9g...U.....|
00000010 29 ce 79 56 c6 3a da 41 ad 48 a7 ae c7 30 00 02 |).yV.:.A.H...0..|
00000020 5f 6b 73 1b 02 20 79 70 f6 b9 93 72 a4 85 a3 37 |_ks.. yp...r...7|
00000030 6f 5e 0c 74 db 75 2b ac 17 99 fa d6 33 ec 81 73 |o^.t.u+.....3..s|
00000040 54 5d 70 00 09 c2 |T]p...|
[18e8 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[18e9 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034acd70 gate 1582330454341659500 evaluation starts
[18ea 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034acd70 signed by 0 principal evaluation starts (used [false])
[18eb 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[18ec 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2549554318456899038 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[18ed 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[18ee 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:11066725724518667428 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[18ef 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[18f0 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1510372543253661228 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[18f1 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1510372543253661228 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[18f2 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18f3 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[18f4 02-22 00:14:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034acd70 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[18f5 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034acd70 principal evaluation succeeds for identity 0
[18f6 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034acd70 gate 1582330454341659500 evaluation succeeds
[18f7 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[18f8 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[18f9 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[18fa 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2549554318456899038 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[18fb 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18fc 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:11066725724518667428 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[18fd 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[18fe 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[18ff 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes
[1900 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes]}
[1901 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:28
[1902 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:28
[1903 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[1904 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1905 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1906 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1907 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1908 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1909 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[190a 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[190b 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[190c 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[190d 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[190e 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[190f 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[1910 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[1911 02-22 00:14:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1912 02-22 00:14:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:17040990428844371613 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1913 02-22 00:14:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes
[1914 02-22 00:14:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1915 02-22 00:14:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[1916 02-22 00:14:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes
[1917 02-22 00:14:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1918 02-22 00:14:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[1919 02-22 00:14:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[191a 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[191b 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[191c 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[191f 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1920 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[191d 02-22 00:14:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15101B
[191e 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1921 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1924 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1925 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c e6 02 32 e7 7d 83 f7 2b f1 7f 23 39 1c 68 e9 |...2.}..+..#9.h.|
00000010 8f 6a c2 30 42 ec 42 38 83 20 c5 60 54 50 6c 4b |.j.0B.B8. .`TPlK|
[1926 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 61 4d bd 8d f1 6f 1b 64 09 c3 74 |0D. EaM...o.d..t|
00000010 51 83 ed ea 51 6c 8c 34 6e d4 8a f5 34 f5 03 48 |Q...Ql.4n...4..H|
00000020 ae 64 5a 90 02 20 22 f3 62 b0 cc 19 d5 7a 02 41 |.dZ.. ".b....z.A|
00000030 8c 7b 2c f2 d9 89 b2 39 58 99 40 69 bc 3f 87 92 |.{,....9X.@i.?..|
00000040 17 7a 85 bf 85 ef |.z....|
[1927 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1922 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 97A7F840D10E3AF3E319035CE8ED8116FA3B2B129E95AA2A04758D11A8A776B6
[1928 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[1929 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[192a 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[1923 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:17040990428844371613 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[192b 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:17040990428844371613 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[192c 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[192d 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[192e 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[192f 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1930 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1931 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1932 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[1933 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1934 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[1935 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[1936 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510071801
[1937 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5FB861F15F73C20B78C970A200A329A95333D6A6EE43436DD7EC0A5EA5D9BE1D
[1938 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[1939 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e6280 gate 1582330454376157100 evaluation starts
[193a 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e6280 signed by 0 principal evaluation starts (used [false])
[193b 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e6280 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[193c 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e6280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[193d 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e6280 principal evaluation fails
[193e 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e6280 gate 1582330454376157100 evaluation fails
[193f 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1940 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1941 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1942 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c e6 02 32 e7 7d 83 f7 2b f1 7f 23 39 1c 68 e9 |...2.}..+..#9.h.|
00000010 8f 6a c2 30 42 ec 42 38 83 20 c5 60 54 50 6c 4b |.j.0B.B8. .`TPlK|
[1943 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 61 4d bd 8d f1 6f 1b 64 09 c3 74 |0D. EaM...o.d..t|
00000010 51 83 ed ea 51 6c 8c 34 6e d4 8a f5 34 f5 03 48 |Q...Ql.4n...4..H|
00000020 ae 64 5a 90 02 20 22 f3 62 b0 cc 19 d5 7a 02 41 |.dZ.. ".b....z.A|
00000030 8c 7b 2c f2 d9 89 b2 39 58 99 40 69 bc 3f 87 92 |.{,....9X.@i.?..|
00000040 17 7a 85 bf 85 ef |.z....|
[1944 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1945 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e6b80 gate 1582330454376781200 evaluation starts
[1946 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e6b80 signed by 0 principal evaluation starts (used [false])
[1947 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e6b80 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1948 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e6b80 principal evaluation succeeds for identity 0
[1949 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e6b80 gate 1582330454376781200 evaluation succeeds
[194a 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[194b 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[194c 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[194d 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[194e 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[194f 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes]}
[1950 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:29
[1951 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:29
[1952 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[1953 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1954 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1955 02-22 00:14:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1956 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11066725724518667428 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[1957 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11066725724518667428 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[1958 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1959 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[195a 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[195b 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[195c 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[195d 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[195e 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[195f 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1960 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1961 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[1962 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[1963 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1964 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[1965 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1966 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1967 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1968 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1969 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[196a 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[196b 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[196c 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[196d 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[196e 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[196f 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[1970 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1971 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes
[1972 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1973 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1974 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1975 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:27 , Envelope: 83 bytes, Signature: 71 bytes
[1976 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1977 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[1978 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1979 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[197a 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[197b 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[197c 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[197d 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[197e 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[197f 02-22 00:14:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1980 02-22 00:14:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1981 02-22 00:14:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1982 02-22 00:14:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1983 02-22 00:14:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1984 02-22 00:14:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1985 02-22 00:14:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 fb bb 8f 8e eb aa 5b 4c 85 45 28 98 d1 f4 ba |.......[L.E(....|
00000010 a6 03 9d 8c b9 45 0d 92 a8 a0 40 d9 c4 9e 23 6e |.....E....@...#n|
[1986 02-22 00:14:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 b8 22 05 5a f0 aa a0 a3 60 e7 |0E.!...".Z....`.|
00000010 4d e3 d6 72 49 33 e2 48 25 94 ea 8b 84 1d cd 28 |M..rI3.H%......(|
00000020 ae 16 e7 c5 9c 02 20 7e 3a aa 9b ce 3a 30 fa 50 |...... ~:...:0.P|
00000030 a0 59 5a 92 55 55 99 1f 42 cf cf 2c 1c 00 ad 50 |.YZ.UU..B..,...P|
00000040 70 4b c0 71 f5 94 3e |pK.q..>|
[1987 02-22 00:14:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2549554318456899038 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[1989 02-22 00:14:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2549554318456899038 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[198a 02-22 00:14:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2549554318456899038 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[198b 02-22 00:14:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15101C
[198c 02-22 00:14:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0B4FFF672D5FDD26790939FA3CE3F68907194F04B23E1265A0B242FEA84FA06B
[198d 02-22 00:14:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[198e 02-22 00:14:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[198f 02-22 00:14:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[1988 02-22 00:14:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1990 02-22 00:14:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354f7b0 gate 1582330454398974200 evaluation starts
[1991 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354f7b0 signed by 0 principal evaluation starts (used [false])
[1992 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354f7b0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1993 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354f7b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1994 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354f7b0 principal evaluation fails
[1995 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354f7b0 gate 1582330454398974200 evaluation fails
[1996 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1997 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1998 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1999 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 fb bb 8f 8e eb aa 5b 4c 85 45 28 98 d1 f4 ba |.......[L.E(....|
00000010 a6 03 9d 8c b9 45 0d 92 a8 a0 40 d9 c4 9e 23 6e |.....E....@...#n|
[199a 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 b8 22 05 5a f0 aa a0 a3 60 e7 |0E.!...".Z....`.|
00000010 4d e3 d6 72 49 33 e2 48 25 94 ea 8b 84 1d cd 28 |M..rI3.H%......(|
00000020 ae 16 e7 c5 9c 02 20 7e 3a aa 9b ce 3a 30 fa 50 |...... ~:...:0.P|
00000030 a0 59 5a 92 55 55 99 1f 42 cf cf 2c 1c 00 ad 50 |.YZ.UU..B..,...P|
00000040 70 4b c0 71 f5 94 3e |pK.q..>|
[199b 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[199c 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356e300 gate 1582330454401300000 evaluation starts
[199d 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356e300 signed by 0 principal evaluation starts (used [false])
[199e 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356e300 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[199f 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356e300 principal evaluation succeeds for identity 0
[19a0 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356e300 gate 1582330454401300000 evaluation succeeds
[19a1 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[19a2 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[19a3 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[19a4 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[19a5 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes
[19a6 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes]}
[19a7 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:31
[19a8 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:31
[19a9 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[19aa 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19ab 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19ac 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19ad 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[19ae 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[19af 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[19b0 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[19b1 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[19b2 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[19b3 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[19b4 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19b5 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes
[19b6 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19b7 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes
[19b8 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19b9 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[19ba 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[19bb 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[19bc 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[19bd 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[19be 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[19bf 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19c0 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[19c1 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19c2 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[19c3 02-22 00:14:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19c4 02-22 00:14:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1510372543253661228 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[19c5 02-22 00:14:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1510372543253661228 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[19c6 02-22 00:14:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19c7 02-22 00:14:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[19c8 02-22 00:14:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[19c9 02-22 00:14:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19ca 02-22 00:14:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[19cb 02-22 00:14:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19cc 02-22 00:14:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[19cd 02-22 00:14:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19ce 02-22 00:14:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[19cf 02-22 00:14:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[19d0 02-22 00:14:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 3a dd dd d3 a8 88 73 7a 5d 2f 0e cd 66 4a 9b |*:.....sz]/..fJ.|
00000010 d8 9f 8c 88 d4 e7 aa 04 1f c2 36 7f 6b 47 7f 23 |..........6.kG.#|
[19d1 02-22 00:14:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 17 d0 69 ec 5f 81 92 d8 31 59 3c 3e |0D. ..i._...1Y<>|
00000010 a7 a0 7a 41 e1 52 fb 44 7d 88 54 e1 76 89 e9 23 |..zA.R.D}.T.v..#|
00000020 ba 50 f5 dd 02 20 5d c3 ee d9 50 d7 79 bc ca 13 |.P... ]...P.y...|
00000030 3b 8a c4 26 e7 61 98 2a 56 72 b4 2e 80 2d 77 94 |;..&.a.*Vr...-w.|
00000040 39 cd f7 d4 38 a8 |9...8.|
[19d2 02-22 00:14:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes
[19d3 02-22 00:14:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19d4 02-22 00:14:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[19d5 02-22 00:14:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[19d6 02-22 00:14:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[19d7 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[19d8 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[19d9 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[19da 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[19db 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[19dc 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 fb bb 8f 8e eb aa 5b 4c 85 45 28 98 d1 f4 ba |.......[L.E(....|
00000010 a6 03 9d 8c b9 45 0d 92 a8 a0 40 d9 c4 9e 23 6e |.....E....@...#n|
[19dd 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 b8 22 05 5a f0 aa a0 a3 60 e7 |0E.!...".Z....`.|
00000010 4d e3 d6 72 49 33 e2 48 25 94 ea 8b 84 1d cd 28 |M..rI3.H%......(|
00000020 ae 16 e7 c5 9c 02 20 7e 3a aa 9b ce 3a 30 fa 50 |...... ~:...:0.P|
00000030 a0 59 5a 92 55 55 99 1f 42 cf cf 2c 1c 00 ad 50 |.YZ.UU..B..,...P|
00000040 70 4b c0 71 f5 94 3e |pK.q..>|
[19de 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[19df 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359bc00 gate 1582330454480483100 evaluation starts
[19e0 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359bc00 signed by 0 principal evaluation starts (used [false])
[19e1 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359bc00 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[19e2 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359bc00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[19e3 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359bc00 principal evaluation fails
[19e4 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359bc00 gate 1582330454480483100 evaluation fails
[19e5 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[19e6 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[19e7 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[19e8 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 fb bb 8f 8e eb aa 5b 4c 85 45 28 98 d1 f4 ba |.......[L.E(....|
00000010 a6 03 9d 8c b9 45 0d 92 a8 a0 40 d9 c4 9e 23 6e |.....E....@...#n|
[19e9 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 b8 22 05 5a f0 aa a0 a3 60 e7 |0E.!...".Z....`.|
00000010 4d e3 d6 72 49 33 e2 48 25 94 ea 8b 84 1d cd 28 |M..rI3.H%......(|
00000020 ae 16 e7 c5 9c 02 20 7e 3a aa 9b ce 3a 30 fa 50 |...... ~:...:0.P|
00000030 a0 59 5a 92 55 55 99 1f 42 cf cf 2c 1c 00 ad 50 |.YZ.UU..B..,...P|
00000040 70 4b c0 71 f5 94 3e |pK.q..>|
[19ea 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[19eb 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035bc500 gate 1582330454481057600 evaluation starts
[19ec 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035bc500 signed by 0 principal evaluation starts (used [false])
[19ed 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035bc500 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[19ee 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035bc500 principal evaluation succeeds for identity 0
[19ef 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035bc500 gate 1582330454481057600 evaluation succeeds
[19f0 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[19f1 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[19f2 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[19f3 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[19f4 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes
[19f5 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19f6 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[19f7 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 4f ff 67 2d 5f dd 26 79 09 39 fa 3c e3 f6 89 |.O.g-_.&y.9.<...|
00000010 07 19 4f 04 b2 3e 12 65 a0 b2 42 fe a8 4f a0 6b |..O..>.e..B..O.k|
[19f8 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 22 1a ec f3 82 a9 1b 7a 71 8c |0E.!.."......zq.|
00000010 bc 00 d5 a3 19 12 b3 93 f2 54 8b 59 78 2d ac 4a |.........T.Yx-.J|
00000020 82 35 d3 23 7e 02 20 0c c1 ad 26 c2 db 28 50 59 |.5.#~. ...&..(PY|
00000030 a7 3a 39 49 4c 9c ae f1 05 b0 23 ee f3 63 cd 9b |.:9IL.....#..c..|
00000040 78 c0 d4 9b ad 58 38 |x....X8|
[19f9 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[19fa 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[19fb 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19fc 02-22 00:14:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[19fd 02-22 00:14:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[19fe 02-22 00:14:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[19ff 02-22 00:14:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a00 02-22 00:14:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[1a01 02-22 00:14:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[1a02 02-22 00:14:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 4f ff 67 2d 5f dd 26 79 09 39 fa 3c e3 f6 89 |.O.g-_.&y.9.<...|
00000010 07 19 4f 04 b2 3e 12 65 a0 b2 42 fe a8 4f a0 6b |..O..>.e..B..O.k|
[1a03 02-22 00:14:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 22 1a ec f3 82 a9 1b 7a 71 8c |0E.!.."......zq.|
00000010 bc 00 d5 a3 19 12 b3 93 f2 54 8b 59 78 2d ac 4a |.........T.Yx-.J|
00000020 82 35 d3 23 7e 02 20 0c c1 ad 26 c2 db 28 50 59 |.5.#~. ...&..(PY|
00000030 a7 3a 39 49 4c 9c ae f1 05 b0 23 ee f3 63 cd 9b |.:9IL.....#..c..|
00000040 78 c0 d4 9b ad 58 38 |x....X8|
[1a04 02-22 00:14:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[1a05 02-22 00:14:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes
[1a06 02-22 00:14:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a07 02-22 00:14:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1a08 02-22 00:14:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 3a dd dd d3 a8 88 73 7a 5d 2f 0e cd 66 4a 9b |*:.....sz]/..fJ.|
00000010 d8 9f 8c 88 d4 e7 aa 04 1f c2 36 7f 6b 47 7f 23 |..........6.kG.#|
[1a09 02-22 00:14:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 17 d0 69 ec 5f 81 92 d8 31 59 3c 3e |0D. ..i._...1Y<>|
00000010 a7 a0 7a 41 e1 52 fb 44 7d 88 54 e1 76 89 e9 23 |..zA.R.D}.T.v..#|
00000020 ba 50 f5 dd 02 20 5d c3 ee d9 50 d7 79 bc ca 13 |.P... ]...P.y...|
00000030 3b 8a c4 26 e7 61 98 2a 56 72 b4 2e 80 2d 77 94 |;..&.a.*Vr...-w.|
00000040 39 cd f7 d4 38 a8 |9...8.|
[1a0a 02-22 00:14:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes
[1a0b 02-22 00:14:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a0c 02-22 00:14:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a0d 02-22 00:14:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[1a0e 02-22 00:14:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a0f 02-22 00:14:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes
[1a10 02-22 00:14:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a11 02-22 00:14:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[1a12 02-22 00:14:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a13 02-22 00:14:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[1a14 02-22 00:14:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[1a15 02-22 00:14:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 4f ff 67 2d 5f dd 26 79 09 39 fa 3c e3 f6 89 |.O.g-_.&y.9.<...|
00000010 07 19 4f 04 b2 3e 12 65 a0 b2 42 fe a8 4f a0 6b |..O..>.e..B..O.k|
[1a16 02-22 00:14:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 22 1a ec f3 82 a9 1b 7a 71 8c |0E.!.."......zq.|
00000010 bc 00 d5 a3 19 12 b3 93 f2 54 8b 59 78 2d ac 4a |.........T.Yx-.J|
00000020 82 35 d3 23 7e 02 20 0c c1 ad 26 c2 db 28 50 59 |.5.#~. ...&..(PY|
00000030 a7 3a 39 49 4c 9c ae f1 05 b0 23 ee f3 63 cd 9b |.:9IL.....#..c..|
00000040 78 c0 d4 9b ad 58 38 |x....X8|
[1a17 02-22 00:14:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[1a18 02-22 00:14:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 46 b5 f7 ce 04 cb bd f0 ef a6 29 |0D. .F.........)|
00000010 23 a8 d1 65 a4 ce 5c 1f a9 30 3e 10 4e dc 93 a6 |#..e..\..0>.N...|
00000020 a5 1c ec 86 02 20 18 90 fa a2 38 e5 0c cc 6b fd |..... ....8...k.|
00000030 98 0f c3 87 73 d6 d1 6a 84 cd 72 d1 cc 49 f1 77 |....s..j..r..I.w|
00000040 f8 69 04 1b ff bd |.i....|
[1a19 02-22 00:14:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1a1a 02-22 00:14:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1a1b 02-22 00:14:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a1c 02-22 00:14:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a1d 02-22 00:14:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a1e 02-22 00:14:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a1f 02-22 00:14:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[1a20 02-22 00:14:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[1a21 02-22 00:14:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a22 02-22 00:14:15.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[1a23 02-22 00:14:15.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a24 02-22 00:14:15.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[1a25 02-22 00:14:15.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a26 02-22 00:14:15.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[1a27 02-22 00:14:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[1a28 02-22 00:14:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[1a29 02-22 00:14:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[1a2a 02-22 00:14:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[1a2b 02-22 00:14:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[1a2c 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a2d 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a2e 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1a2f 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1a30 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1a31 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1a32 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1a33 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1a34 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1a35 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1a36 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1a37 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363cbe0 gate 1582330455144674900 evaluation starts
[1a38 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363cbe0 signed by 0 principal evaluation starts (used [false])
[1a39 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363cbe0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1a3a 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363cbe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1a3b 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363cbe0 principal evaluation fails
[1a3c 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363cbe0 gate 1582330455144674900 evaluation fails
[1a3d 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1a3e 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1a3f 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1a40 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1a41 02-22 00:14:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1a42 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1a43 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363d4e0 gate 1582330455152493600 evaluation starts
[1a44 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363d4e0 signed by 0 principal evaluation starts (used [false])
[1a45 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363d4e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1a46 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363d4e0 principal evaluation succeeds for identity 0
[1a47 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363d4e0 gate 1582330455152493600 evaluation succeeds
[1a48 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1a49 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1a4a 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1a4b 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1a4c 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a4d 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a4e 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1a4f 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1a50 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1a51 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1a52 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1a53 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1a54 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1a55 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[1a56 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1a57 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003664f40 gate 1582330455156250200 evaluation starts
[1a58 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003664f40 signed by 0 principal evaluation starts (used [false])
[1a59 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003664f40 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1a5a 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003664f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1a5b 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003664f40 principal evaluation fails
[1a5c 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003664f40 gate 1582330455156250200 evaluation fails
[1a5d 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1a5e 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1a5f 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1a60 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1a61 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[1a62 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1a63 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003665840 gate 1582330455159209600 evaluation starts
[1a64 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003665840 signed by 0 principal evaluation starts (used [false])
[1a65 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003665840 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1a66 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003665840 principal evaluation succeeds for identity 0
[1a67 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003665840 gate 1582330455159209600 evaluation succeeds
[1a68 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1a69 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1a6a 02-22 00:14:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1a6b 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1a6c 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a6d 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[1a6e 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a6f 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a70 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a71 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a72 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a73 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1a75 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1a76 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1a74 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[1a77 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1a78 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1a79 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a7b 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a7a 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1a7d 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1a7e 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[1a7c 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9975765784628159959 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[1a7f 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1a80 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9975765784628159959 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[1a82 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1a81 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d550 gate 1582330455167314000 evaluation starts
[1a83 02-22 00:14:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d550 signed by 0 principal evaluation starts (used [false])
[1a84 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d550 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1a85 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1a86 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d550 principal evaluation fails
[1a87 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d550 gate 1582330455167314000 evaluation fails
[1a88 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1a89 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1a8a 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1a8b 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1a8c 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[1a8d 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1a8e 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f59f0 gate 1582330455173247700 evaluation starts
[1a8f 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f59f0 signed by 0 principal evaluation starts (used [false])
[1a90 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f59f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1a91 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f59f0 principal evaluation succeeds for identity 0
[1a92 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f59f0 gate 1582330455173247700 evaluation succeeds
[1a93 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1a94 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1a95 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1a96 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1a97 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[1a98 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[1a99 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a9a 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1a9b 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1a9c 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1a9d 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1a9e 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1a9f 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1aa0 02-22 00:14:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1aa1 02-22 00:14:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1aa2 02-22 00:14:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1aa3 02-22 00:14:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1aa4 02-22 00:14:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b1b00 gate 1582330455188839300 evaluation starts
[1aa5 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b1b00 signed by 0 principal evaluation starts (used [false])
[1aa6 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b1b00 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1aa7 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b1b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1aa8 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b1b00 principal evaluation fails
[1aa9 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b1b00 gate 1582330455188839300 evaluation fails
[1aaa 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1aab 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1aac 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1aad 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1aae 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1aaf 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1ab0 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cc400 gate 1582330455196065600 evaluation starts
[1ab1 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cc400 signed by 0 principal evaluation starts (used [false])
[1ab2 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cc400 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1ab3 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cc400 principal evaluation succeeds for identity 0
[1ab4 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cc400 gate 1582330455196065600 evaluation succeeds
[1ab5 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1ab6 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1ab7 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1ab8 02-22 00:14:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1ab9 02-22 00:14:15.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[1aba 02-22 00:14:15.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[1abb 02-22 00:14:15.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1abc 02-22 00:14:15.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[1abd 02-22 00:14:15.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1abe 02-22 00:14:15.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1abf 02-22 00:14:15.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ac0 02-22 00:14:15.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1ac1 02-22 00:14:15.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1ac2 02-22 00:14:15.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1ac3 02-22 00:14:15.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1ac4 02-22 00:14:15.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1ac5 02-22 00:14:15.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1ac6 02-22 00:14:15.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1ac7 02-22 00:14:15.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1ac8 02-22 00:14:15.22 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1ac9 02-22 00:14:15.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f67c0 gate 1582330455224614800 evaluation starts
[1aca 02-22 00:14:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f67c0 signed by 0 principal evaluation starts (used [false])
[1acb 02-22 00:14:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f67c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1acc 02-22 00:14:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f67c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1acd 02-22 00:14:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f67c0 principal evaluation fails
[1ace 02-22 00:14:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f67c0 gate 1582330455224614800 evaluation fails
[1acf 02-22 00:14:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1ad0 02-22 00:14:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1ad1 02-22 00:14:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1ad2 02-22 00:14:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1ad3 02-22 00:14:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1ad4 02-22 00:14:15.25 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1ad5 02-22 00:14:15.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f70c0 gate 1582330455251428400 evaluation starts
[1ad6 02-22 00:14:15.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f70c0 signed by 0 principal evaluation starts (used [false])
[1ad7 02-22 00:14:15.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f70c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1ad8 02-22 00:14:15.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f70c0 principal evaluation succeeds for identity 0
[1ad9 02-22 00:14:15.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f70c0 gate 1582330455251428400 evaluation succeeds
[1ada 02-22 00:14:15.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1adb 02-22 00:14:15.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1adc 02-22 00:14:15.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1add 02-22 00:14:15.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1ade 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[1adf 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[1ae0 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[1ae1 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[1ae2 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ae3 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ae4 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1ae5 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1ae6 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1ae7 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1ae8 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1ae9 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1aea 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1aeb 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[1aec 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1aed 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370b880 gate 1582330455267370600 evaluation starts
[1aee 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370b880 signed by 0 principal evaluation starts (used [false])
[1aef 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370b880 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1af0 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370b880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1af1 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370b880 principal evaluation fails
[1af2 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370b880 gate 1582330455267370600 evaluation fails
[1af3 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1af4 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1af5 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1af6 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1af7 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[1af8 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1af9 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003732180 gate 1582330455268677600 evaluation starts
[1afa 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003732180 signed by 0 principal evaluation starts (used [false])
[1afb 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003732180 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1afc 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003732180 principal evaluation succeeds for identity 0
[1afd 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003732180 gate 1582330455268677600 evaluation succeeds
[1afe 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1aff 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1b00 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1b01 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1b02 02-22 00:14:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b03 02-22 00:14:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9975765784628159959 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[1b04 02-22 00:14:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9975765784628159959 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[1b05 02-22 00:14:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b06 02-22 00:14:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[1b07 02-22 00:14:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b08 02-22 00:14:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b09 02-22 00:14:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b0a 02-22 00:14:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9879774930762816042 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[1b0b 02-22 00:14:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9879774930762816042 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[1b0c 02-22 00:14:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[1b0d 02-22 00:14:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b0e 02-22 00:14:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[1b0f 02-22 00:14:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b10 02-22 00:14:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b11 02-22 00:14:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b12 02-22 00:14:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b13 02-22 00:14:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[1b14 02-22 00:14:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[1b15 02-22 00:14:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b16 02-22 00:14:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b17 02-22 00:14:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b18 02-22 00:14:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b19 02-22 00:14:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:4407882748897032316 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1b1a 02-22 00:14:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:4407882748897032316 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1b1b 02-22 00:14:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b1c 02-22 00:14:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b1d 02-22 00:14:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b1e 02-22 00:14:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b1f 02-22 00:14:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b20 02-22 00:14:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b21 02-22 00:14:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[1b22 02-22 00:14:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b23 02-22 00:14:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:11594440961254503557 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1b24 02-22 00:14:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:11594440961254503557 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1b25 02-22 00:14:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[1b26 02-22 00:14:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b27 02-22 00:14:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[1b28 02-22 00:14:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b29 02-22 00:14:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[1b2a 02-22 00:14:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1b2b 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 2b 3a a2 d6 97 2c 57 33 93 1d 98 94 2b 29 a0 |.+:...,W3....+).|
00000010 51 45 03 49 30 3d 47 31 31 32 b4 d1 66 79 4c 19 |QE.I0=G112..fyL.|
[1b2c 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 21 8f 6b f0 5a ef ed c5 65 a7 6d |0D. [!.k.Z...e.m|
00000010 f7 f0 27 69 57 0d ca 78 59 e4 c8 c8 94 89 7c 19 |..'iW..xY.....|.|
00000020 80 75 27 f2 02 20 11 b9 d2 c2 dd 3a 4c 2c d9 5d |.u'.. .....:L,.]|
00000030 ba dc 09 f2 a7 44 c6 ca 8c 11 d3 40 3e 89 39 ba |.....D.....@>.9.|
00000040 a2 d1 7f 68 93 49 |...h.I|
[1b2d 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1b2e 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 9d 8f c8 b0 19 63 54 07 38 6b cb |0D. F.....cT.8k.|
00000010 1e 67 ef 38 82 3f 41 39 ed 9b 32 49 dd d5 9e 79 |.g.8.?A9..2I...y|
00000020 c7 83 83 8f 02 20 11 b6 92 be 2e a0 72 83 88 1b |..... ......r...|
00000030 9a f1 0f 95 6b 53 5a a2 23 81 cf a5 0e b4 5c 5c |....kSZ.#.....\\|
00000040 7d 06 78 6e 95 c3 |}.xn..|
[1b2f 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1b30 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[1b31 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:33
[1b32 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:33
[1b33 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[1b34 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b35 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b36 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b37 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[1b38 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b39 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b3a 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[1b3b 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[1b3c 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[1b3d 02-22 00:14:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b3e 02-22 00:14:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1b3f 02-22 00:14:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b40 02-22 00:14:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1b41 02-22 00:14:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[1b42 02-22 00:14:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b43 02-22 00:14:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1b44 02-22 00:14:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1b45 02-22 00:14:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1b46 02-22 00:14:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1b47 02-22 00:14:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1b48 02-22 00:14:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1b49 02-22 00:14:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 71 a5 48 da d7 7d d4 17 cc 92 d7 e1 b0 ec dc |.q.H..}.........|
00000010 35 6f 1f 11 05 88 0b 8d c2 b7 72 e7 1f 29 ae 62 |5o........r..).b|
[1b4a 02-22 00:14:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 59 91 bd 0a 5f 89 d1 10 4d 53 |0E.!..Y..._...MS|
00000010 e9 7c 2d 7b 9b 28 4c 16 e6 f7 0c 35 63 5a b7 9c |.|-{.(L....5cZ..|
00000020 fd ac 0a d1 b8 02 20 32 7f 4b 48 5f 05 56 4d b5 |...... 2.KH_.VM.|
00000030 f4 d3 f8 58 be ad d8 87 41 83 67 44 c7 a7 54 d1 |...X....A.gD..T.|
00000040 95 3f f8 56 b4 ea a6 |.?.V...|
[1b4b 02-22 00:14:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1b4c 02-22 00:14:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ab920 gate 1582330458347406400 evaluation starts
[1b4d 02-22 00:14:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ab920 signed by 0 principal evaluation starts (used [false])
[1b4e 02-22 00:14:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ab920 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1b4f 02-22 00:14:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ab920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1b50 02-22 00:14:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[1b51 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ab920 principal evaluation fails
[1b52 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ab920 gate 1582330458347406400 evaluation fails
[1b53 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:6809303950504730469 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[1b54 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[1b55 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1101750941549468615 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[1b56 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[1b57 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1b58 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1b59 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1b5a 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 71 a5 48 da d7 7d d4 17 cc 92 d7 e1 b0 ec dc |.q.H..}.........|
00000010 35 6f 1f 11 05 88 0b 8d c2 b7 72 e7 1f 29 ae 62 |5o........r..).b|
[1b5b 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 59 91 bd 0a 5f 89 d1 10 4d 53 |0E.!..Y..._...MS|
00000010 e9 7c 2d 7b 9b 28 4c 16 e6 f7 0c 35 63 5a b7 9c |.|-{.(L....5cZ..|
00000020 fd ac 0a d1 b8 02 20 32 7f 4b 48 5f 05 56 4d b5 |...... 2.KH_.VM.|
00000030 f4 d3 f8 58 be ad d8 87 41 83 67 44 c7 a7 54 d1 |...X....A.gD..T.|
00000040 95 3f f8 56 b4 ea a6 |.?.V...|
[1b5c 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2249708821709198614 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[1b5d 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2249708821709198614 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1b5e 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b5f 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1b60 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f4220 gate 1582330458355950700 evaluation starts
[1b61 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f4220 signed by 0 principal evaluation starts (used [false])
[1b62 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f4220 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1b63 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f4220 principal evaluation succeeds for identity 0
[1b64 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f4220 gate 1582330458355950700 evaluation succeeds
[1b65 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1b66 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1b67 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1b68 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:6809303950504730469 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1b69 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b6a 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1b6b 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes
[1b6c 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes]}
[1b6d 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:30
[1b6e 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:30
[1b6f 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[1b70 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b71 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1101750941549468615 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1b72 02-22 00:14:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b73 02-22 00:14:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b74 02-22 00:14:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b75 02-22 00:14:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[1b76 02-22 00:14:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b77 02-22 00:14:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b78 02-22 00:14:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b79 02-22 00:14:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[1b7a 02-22 00:14:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[1b7b 02-22 00:14:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[1b7c 02-22 00:14:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b7d 02-22 00:14:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6809303950504730469 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[1b7e 02-22 00:14:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6809303950504730469 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[1b7f 02-22 00:14:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6809303950504730469 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[1b80 02-22 00:14:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b81 02-22 00:14:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:10302258589405902770 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1b82 02-22 00:14:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:10302258589405902770 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1b83 02-22 00:14:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10302258589405902770 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1b84 02-22 00:14:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b85 02-22 00:14:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b86 02-22 00:14:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b87 02-22 00:14:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b88 02-22 00:14:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b89 02-22 00:14:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b8a 02-22 00:14:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[1b8b 02-22 00:14:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b8c 02-22 00:14:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2249708821709198614 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[1b8d 02-22 00:14:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2249708821709198614 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[1b8e 02-22 00:14:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b8f 02-22 00:14:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1b90 02-22 00:14:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1b91 02-22 00:14:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b92 02-22 00:14:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1b93 02-22 00:14:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[1b94 02-22 00:14:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1b95 02-22 00:14:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1b96 02-22 00:14:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1b97 02-22 00:14:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1b99 02-22 00:14:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1b9a 02-22 00:14:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1b98 02-22 00:14:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1101750941549468615 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[1b9b 02-22 00:14:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1101750941549468615 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[1b9c 02-22 00:14:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1b9d 02-22 00:14:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1b9e 02-22 00:14:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e e0 f5 56 1e 57 84 ea 70 11 31 76 d9 54 4b 99 |N..V.W..p.1v.TK.|
00000010 f1 a6 9b 0b d8 6a 11 24 8b 45 b6 d9 8a 7d 4d e3 |.....j.$.E...}M.|
[1b9f 02-22 00:14:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 a2 00 69 50 06 6a 0b 1e f6 92 |0E.!....iP.j....|
00000010 48 e4 4e 4f 9c 96 b2 98 48 cc 82 c0 44 ac 5b 7a |H.NO....H...D.[z|
00000020 17 20 6c af 32 02 20 58 7d 6e 92 aa 63 27 5c 95 |. l.2. X}n..c'\.|
00000030 ad 91 18 60 53 3e 8c 6a db 9f 78 fe 7b 01 3d 54 |...`S>.j..x.{.=T|
00000040 cb 9c 1b 32 f6 a3 d9 |...2...|
[1ba0 02-22 00:14:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1ba1 02-22 00:14:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5ca0 gate 1582330458406038100 evaluation starts
[1ba2 02-22 00:14:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5ca0 signed by 0 principal evaluation starts (used [false])
[1ba3 02-22 00:14:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5ca0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1ba4 02-22 00:14:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1ba5 02-22 00:14:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5ca0 principal evaluation fails
[1ba6 02-22 00:14:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5ca0 gate 1582330458406038100 evaluation fails
[1ba7 02-22 00:14:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1ba8 02-22 00:14:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1ba9 02-22 00:14:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1baa 02-22 00:14:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e e0 f5 56 1e 57 84 ea 70 11 31 76 d9 54 4b 99 |N..V.W..p.1v.TK.|
00000010 f1 a6 9b 0b d8 6a 11 24 8b 45 b6 d9 8a 7d 4d e3 |.....j.$.E...}M.|
[1bab 02-22 00:14:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15101D
[1bac 02-22 00:14:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 81E61D6777D482B8CF933800B4A734F0C0EC343EB322EE318E642B566BAA6280
[1bad 02-22 00:14:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[1bae 02-22 00:14:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[1baf 02-22 00:14:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1bb0 02-22 00:14:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[1bb1 02-22 00:14:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 a2 00 69 50 06 6a 0b 1e f6 92 |0E.!....iP.j....|
00000010 48 e4 4e 4f 9c 96 b2 98 48 cc 82 c0 44 ac 5b 7a |H.NO....H...D.[z|
00000020 17 20 6c af 32 02 20 58 7d 6e 92 aa 63 27 5c 95 |. l.2. X}n..c'\.|
00000030 ad 91 18 60 53 3e 8c 6a db 9f 78 fe 7b 01 3d 54 |...`S>.j..x.{.=T|
00000040 cb 9c 1b 32 f6 a3 d9 |...2...|
[1bb2 02-22 00:14:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1bb3 02-22 00:14:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038485a0 gate 1582330458418896800 evaluation starts
[1bb4 02-22 00:14:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038485a0 signed by 0 principal evaluation starts (used [false])
[1bb5 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038485a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1bb6 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038485a0 principal evaluation succeeds for identity 0
[1bb7 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038485a0 gate 1582330458418896800 evaluation succeeds
[1bb8 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1bb9 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1bba 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1bbb 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1bbc 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes
[1bbd 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes]}
[1bbe 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:32
[1bbf 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:32
[1bc0 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[1bc1 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1bc2 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1bc3 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1bc4 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1bc5 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1bc6 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[1bc7 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1bc8 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[1bc9 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1bca 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1bcb 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[1bcc 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[1bcd 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1bce 02-22 00:14:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1bcf 02-22 00:14:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1bd0 02-22 00:14:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1bd1 02-22 00:14:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[1bd2 02-22 00:14:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[1bd3 02-22 00:14:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1bd4 02-22 00:14:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[1bd5 02-22 00:14:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[1bd6 02-22 00:14:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1bd7 02-22 00:14:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[1bd8 02-22 00:14:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[1bd9 02-22 00:14:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 e6 1d 67 77 d4 82 b8 cf 93 38 00 b4 a7 34 f0 |...gw.....8...4.|
00000010 c0 ec 34 3e b3 22 ee 31 8e 64 2b 56 6b aa 62 80 |..4>.".1.d+Vk.b.|
[1bda 02-22 00:14:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 c8 84 cc 75 43 1a 14 3c a0 02 |0E.!.....uC..<..|
00000010 76 d3 04 58 c3 38 6a 62 85 d2 fc fb 69 11 09 e0 |v..X.8jb....i...|
00000020 ba 24 f8 a4 44 02 20 3c 98 45 37 6c 17 2a 8b 99 |.$..D. <.E7l.*..|
00000030 b1 6d 87 fb fe e3 be 4a 93 a7 93 86 ac c5 ca 0b |.m.....J........|
00000040 81 4f 41 2a 60 6a 28 |.OA*`j(|
[1bdb 02-22 00:14:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[1bdc 02-22 00:14:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 ce db 51 86 60 80 a8 01 c3 e0 |0E.!....Q.`.....|
00000010 fc a7 ce c2 bf f9 67 2a d4 ce 35 d2 cf 42 9f 7d |......g*..5..B.}|
00000020 9f 69 74 ab 50 02 20 4c 09 ba e8 24 34 e3 65 be |.it.P. L...$4.e.|
00000030 64 b2 0a f1 b4 b3 03 1e ab 3e 54 53 9a 67 a3 08 |d........>TS.g..|
00000040 66 29 27 71 f6 ce 0b |f)'q...|
[1bdd 02-22 00:14:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1bde 02-22 00:14:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1bdf 02-22 00:14:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1be0 02-22 00:14:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1be1 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[1be2 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1be3 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[1be4 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[1be5 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 e6 1d 67 77 d4 82 b8 cf 93 38 00 b4 a7 34 f0 |...gw.....8...4.|
00000010 c0 ec 34 3e b3 22 ee 31 8e 64 2b 56 6b aa 62 80 |..4>.".1.d+Vk.b.|
[1be6 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 c8 84 cc 75 43 1a 14 3c a0 02 |0E.!.....uC..<..|
00000010 76 d3 04 58 c3 38 6a 62 85 d2 fc fb 69 11 09 e0 |v..X.8jb....i...|
00000020 ba 24 f8 a4 44 02 20 3c 98 45 37 6c 17 2a 8b 99 |.$..D. <.E7l.*..|
00000030 b1 6d 87 fb fe e3 be 4a 93 a7 93 86 ac c5 ca 0b |.m.....J........|
00000040 81 4f 41 2a 60 6a 28 |.OA*`j(|
[1be7 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes
[1be8 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes
[1be9 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1bea 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1beb 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 2b 3a a2 d6 97 2c 57 33 93 1d 98 94 2b 29 a0 |.+:...,W3....+).|
00000010 51 45 03 49 30 3d 47 31 31 32 b4 d1 66 79 4c 19 |QE.I0=G112..fyL.|
[1bec 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 21 8f 6b f0 5a ef ed c5 65 a7 6d |0D. [!.k.Z...e.m|
00000010 f7 f0 27 69 57 0d ca 78 59 e4 c8 c8 94 89 7c 19 |..'iW..xY.....|.|
00000020 80 75 27 f2 02 20 11 b9 d2 c2 dd 3a 4c 2c d9 5d |.u'.. .....:L,.]|
00000030 ba dc 09 f2 a7 44 c6 ca 8c 11 d3 40 3e 89 39 ba |.....D.....@>.9.|
00000040 a2 d1 7f 68 93 49 |...h.I|
[1bed 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1bee 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[1bef 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[1bf0 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1bf1 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[1bf2 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1bf3 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1bf4 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1bf5 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1bf6 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1bf7 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1bf8 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1bf9 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e e0 f5 56 1e 57 84 ea 70 11 31 76 d9 54 4b 99 |N..V.W..p.1v.TK.|
00000010 f1 a6 9b 0b d8 6a 11 24 8b 45 b6 d9 8a 7d 4d e3 |.....j.$.E...}M.|
[1bfa 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 a2 00 69 50 06 6a 0b 1e f6 92 |0E.!....iP.j....|
00000010 48 e4 4e 4f 9c 96 b2 98 48 cc 82 c0 44 ac 5b 7a |H.NO....H...D.[z|
00000020 17 20 6c af 32 02 20 58 7d 6e 92 aa 63 27 5c 95 |. l.2. X}n..c'\.|
00000030 ad 91 18 60 53 3e 8c 6a db 9f 78 fe 7b 01 3d 54 |...`S>.j..x.{.=T|
00000040 cb 9c 1b 32 f6 a3 d9 |...2...|
[1bfb 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1bfc 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0430 gate 1582330458477096900 evaluation starts
[1bfd 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0430 signed by 0 principal evaluation starts (used [false])
[1bfe 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0430 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1bff 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1c00 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0430 principal evaluation fails
[1c01 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0430 gate 1582330458477096900 evaluation fails
[1c02 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1c03 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1c04 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1c05 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e e0 f5 56 1e 57 84 ea 70 11 31 76 d9 54 4b 99 |N..V.W..p.1v.TK.|
00000010 f1 a6 9b 0b d8 6a 11 24 8b 45 b6 d9 8a 7d 4d e3 |.....j.$.E...}M.|
[1c06 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 a2 00 69 50 06 6a 0b 1e f6 92 |0E.!....iP.j....|
00000010 48 e4 4e 4f 9c 96 b2 98 48 cc 82 c0 44 ac 5b 7a |H.NO....H...D.[z|
00000020 17 20 6c af 32 02 20 58 7d 6e 92 aa 63 27 5c 95 |. l.2. X}n..c'\.|
00000030 ad 91 18 60 53 3e 8c 6a db 9f 78 fe 7b 01 3d 54 |...`S>.j..x.{.=T|
00000040 cb 9c 1b 32 f6 a3 d9 |...2...|
[1c07 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1c08 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0d30 gate 1582330458479472600 evaluation starts
[1c09 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0d30 signed by 0 principal evaluation starts (used [false])
[1c0a 02-22 00:14:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0d30 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1c0b 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0d30 principal evaluation succeeds for identity 0
[1c0c 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0d30 gate 1582330458479472600 evaluation succeeds
[1c0d 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1c0e 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1c0f 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1c10 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1c11 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes
[1c12 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c13 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c14 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c15 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[1c16 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[1c17 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c18 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1c19 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1c1a 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1c1b 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1c1c 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1c1d 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1c1e 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 71 a5 48 da d7 7d d4 17 cc 92 d7 e1 b0 ec dc |.q.H..}.........|
00000010 35 6f 1f 11 05 88 0b 8d c2 b7 72 e7 1f 29 ae 62 |5o........r..).b|
[1c1f 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 59 91 bd 0a 5f 89 d1 10 4d 53 |0E.!..Y..._...MS|
00000010 e9 7c 2d 7b 9b 28 4c 16 e6 f7 0c 35 63 5a b7 9c |.|-{.(L....5cZ..|
00000020 fd ac 0a d1 b8 02 20 32 7f 4b 48 5f 05 56 4d b5 |...... 2.KH_.VM.|
00000030 f4 d3 f8 58 be ad d8 87 41 83 67 44 c7 a7 54 d1 |...X....A.gD..T.|
00000040 95 3f f8 56 b4 ea a6 |.?.V...|
[1c20 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1c21 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d0b60 gate 1582330458485185000 evaluation starts
[1c22 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d0b60 signed by 0 principal evaluation starts (used [false])
[1c23 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d0b60 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1c24 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d0b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1c25 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d0b60 principal evaluation fails
[1c26 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d0b60 gate 1582330458485185000 evaluation fails
[1c27 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1c28 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1c29 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1c2a 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 71 a5 48 da d7 7d d4 17 cc 92 d7 e1 b0 ec dc |.q.H..}.........|
00000010 35 6f 1f 11 05 88 0b 8d c2 b7 72 e7 1f 29 ae 62 |5o........r..).b|
[1c2b 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 59 91 bd 0a 5f 89 d1 10 4d 53 |0E.!..Y..._...MS|
00000010 e9 7c 2d 7b 9b 28 4c 16 e6 f7 0c 35 63 5a b7 9c |.|-{.(L....5cZ..|
00000020 fd ac 0a d1 b8 02 20 32 7f 4b 48 5f 05 56 4d b5 |...... 2.KH_.VM.|
00000030 f4 d3 f8 58 be ad d8 87 41 83 67 44 c7 a7 54 d1 |...X....A.gD..T.|
00000040 95 3f f8 56 b4 ea a6 |.?.V...|
[1c2c 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1c2d 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d1460 gate 1582330458489156800 evaluation starts
[1c2e 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d1460 signed by 0 principal evaluation starts (used [false])
[1c2f 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d1460 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1c30 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d1460 principal evaluation succeeds for identity 0
[1c31 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d1460 gate 1582330458489156800 evaluation succeeds
[1c32 02-22 00:14:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1c33 02-22 00:14:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1c34 02-22 00:14:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1c35 02-22 00:14:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1c36 02-22 00:14:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes
[1c37 02-22 00:14:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c38 02-22 00:14:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[1c39 02-22 00:14:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 e6 1d 67 77 d4 82 b8 cf 93 38 00 b4 a7 34 f0 |...gw.....8...4.|
00000010 c0 ec 34 3e b3 22 ee 31 8e 64 2b 56 6b aa 62 80 |..4>.".1.d+Vk.b.|
[1c3a 02-22 00:14:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 c8 84 cc 75 43 1a 14 3c a0 02 |0E.!.....uC..<..|
00000010 76 d3 04 58 c3 38 6a 62 85 d2 fc fb 69 11 09 e0 |v..X.8jb....i...|
00000020 ba 24 f8 a4 44 02 20 3c 98 45 37 6c 17 2a 8b 99 |.$..D. <.E7l.*..|
00000030 b1 6d 87 fb fe e3 be 4a 93 a7 93 86 ac c5 ca 0b |.m.....J........|
00000040 81 4f 41 2a 60 6a 28 |.OA*`j(|
[1c3b 02-22 00:14:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes
[1c3c 02-22 00:14:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes
[1c3d 02-22 00:14:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c3e 02-22 00:14:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1c3f 02-22 00:14:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 2b 3a a2 d6 97 2c 57 33 93 1d 98 94 2b 29 a0 |.+:...,W3....+).|
00000010 51 45 03 49 30 3d 47 31 31 32 b4 d1 66 79 4c 19 |QE.I0=G112..fyL.|
[1c40 02-22 00:14:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 21 8f 6b f0 5a ef ed c5 65 a7 6d |0D. [!.k.Z...e.m|
00000010 f7 f0 27 69 57 0d ca 78 59 e4 c8 c8 94 89 7c 19 |..'iW..xY.....|.|
00000020 80 75 27 f2 02 20 11 b9 d2 c2 dd 3a 4c 2c d9 5d |.u'.. .....:L,.]|
00000030 ba dc 09 f2 a7 44 c6 ca 8c 11 d3 40 3e 89 39 ba |.....D.....@>.9.|
00000040 a2 d1 7f 68 93 49 |...h.I|
[1c41 02-22 00:14:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1c42 02-22 00:14:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c43 02-22 00:14:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c44 02-22 00:14:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c45 02-22 00:14:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c46 02-22 00:14:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[1c47 02-22 00:14:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[1c48 02-22 00:14:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c49 02-22 00:14:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[1c4a 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c4b 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[1c4c 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c4d 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[1c4e 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c4f 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c50 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c51 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1c52 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1c53 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1c54 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1c55 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1c56 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1c57 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1c58 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1c59 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1c5a 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003926250 gate 1582330459117300400 evaluation starts
[1c5b 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003926250 signed by 0 principal evaluation starts (used [false])
[1c5c 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003926250 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1c5d 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003926250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1c5e 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003926250 principal evaluation fails
[1c5f 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003926250 gate 1582330459117300400 evaluation fails
[1c60 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1c61 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1c62 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1c63 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1c64 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1c65 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1c66 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003926b50 gate 1582330459118794400 evaluation starts
[1c67 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003926b50 signed by 0 principal evaluation starts (used [false])
[1c68 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003926b50 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1c69 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003926b50 principal evaluation succeeds for identity 0
[1c6a 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003926b50 gate 1582330459118794400 evaluation succeeds
[1c6b 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1c6c 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1c6d 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1c6e 02-22 00:14:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1c6f 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[1c70 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[1c71 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[1c72 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[1c73 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c74 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c75 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1c76 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1c77 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[1c78 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1c79 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1c7a 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1c7b 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1c7c 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1c7d 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[1c7e 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1c7f 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d470 gate 1582330459128019900 evaluation starts
[1c80 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d470 signed by 0 principal evaluation starts (used [false])
[1c81 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d470 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1c82 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1c83 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d470 principal evaluation fails
[1c84 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d470 gate 1582330459128019900 evaluation fails
[1c85 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1c86 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1c87 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1c88 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1c89 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[1c8a 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1c8b 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395dd70 gate 1582330459129569800 evaluation starts
[1c8c 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395dd70 signed by 0 principal evaluation starts (used [false])
[1c8d 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395dd70 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1c8e 02-22 00:14:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395dd70 principal evaluation succeeds for identity 0
[1c8f 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395dd70 gate 1582330459129569800 evaluation succeeds
[1c90 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1c91 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1c92 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1c93 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1c94 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1c95 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[1c96 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c97 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c98 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1c99 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1c9a 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1c9b 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1c9c 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1c9d 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1c9e 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1c9f 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1ca0 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[1ca1 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1ca2 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ba80 gate 1582330459133528600 evaluation starts
[1ca3 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ba80 signed by 0 principal evaluation starts (used [false])
[1ca4 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ba80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1ca5 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ba80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1ca6 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ba80 principal evaluation fails
[1ca7 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ba80 gate 1582330459133528600 evaluation fails
[1ca8 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1ca9 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1caa 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1cab 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1cac 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[1cad 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1cae 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a8380 gate 1582330459135347200 evaluation starts
[1caf 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a8380 signed by 0 principal evaluation starts (used [false])
[1cb0 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a8380 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1cb1 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a8380 principal evaluation succeeds for identity 0
[1cb2 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a8380 gate 1582330459135347200 evaluation succeeds
[1cb3 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1cb4 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1cb5 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1cb6 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1cb7 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[1cb8 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[1cb9 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1cba 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1cbb 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1cbc 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1cbd 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1cbe 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1cbf 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1cc0 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1cc1 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1cc2 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1cc3 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1cc4 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4490 gate 1582330459139263700 evaluation starts
[1cc5 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4490 signed by 0 principal evaluation starts (used [false])
[1cc6 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4490 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1cc7 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1cc8 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4490 principal evaluation fails
[1cc9 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4490 gate 1582330459139263700 evaluation fails
[1cca 02-22 00:14:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1ccb 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1ccc 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1ccd 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1cce 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1ccf 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1cd0 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4d90 gate 1582330459145193000 evaluation starts
[1cd1 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4d90 signed by 0 principal evaluation starts (used [false])
[1cd2 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4d90 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1cd3 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4d90 principal evaluation succeeds for identity 0
[1cd4 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4d90 gate 1582330459145193000 evaluation succeeds
[1cd5 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1cd6 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1cd7 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1cd8 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1cd9 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[1cda 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[1cdb 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1cdc 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[1cdd 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[1cde 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[1cdf 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[1ce0 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[1ce1 02-22 00:14:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ce2 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ce3 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1ce4 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1ce5 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1ce6 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1ce7 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1ce8 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1ce9 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1cea 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1ceb 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1cec 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a09de0 gate 1582330459153403600 evaluation starts
[1ced 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a09de0 signed by 0 principal evaluation starts (used [false])
[1cee 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a09de0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1cef 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a09de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1cf0 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a09de0 principal evaluation fails
[1cf1 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a09de0 gate 1582330459153403600 evaluation fails
[1cf2 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1cf3 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1cf4 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1cf5 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1cf6 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1cf7 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1cf8 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2c6e0 gate 1582330459155184200 evaluation starts
[1cf9 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2c6e0 signed by 0 principal evaluation starts (used [false])
[1cfa 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2c6e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1cfb 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2c6e0 principal evaluation succeeds for identity 0
[1cfc 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2c6e0 gate 1582330459155184200 evaluation succeeds
[1cfd 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1cfe 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1cff 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1d00 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1d01 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d02 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d03 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1d04 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1d05 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1d06 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1d07 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1d08 02-22 00:14:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1d09 02-22 00:14:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d0a 02-22 00:14:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1d0c 02-22 00:14:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d0d 02-22 00:14:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[1d0e 02-22 00:14:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d0b 02-22 00:14:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[1d0f 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d10 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:504766897056210687 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[1d11 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1d12 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42140 gate 1582330459170851100 evaluation starts
[1d14 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42140 signed by 0 principal evaluation starts (used [false])
[1d15 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42140 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1d16 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1d17 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42140 principal evaluation fails
[1d18 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42140 gate 1582330459170851100 evaluation fails
[1d19 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1d1a 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1d1b 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1d1c 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1d1d 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[1d1e 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1d1f 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42a40 gate 1582330459171953900 evaluation starts
[1d20 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42a40 signed by 0 principal evaluation starts (used [false])
[1d21 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42a40 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1d22 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42a40 principal evaluation succeeds for identity 0
[1d23 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42a40 gate 1582330459171953900 evaluation succeeds
[1d24 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1d25 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1d26 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1d27 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1d28 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d13 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:504766897056210687 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[1d29 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d2a 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 504766897056210687 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[1d2b 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 504766897056210687 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[1d2c 02-22 00:14:19.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d2d 02-22 00:14:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1d2e 02-22 00:14:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d2f 02-22 00:14:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1d30 02-22 00:14:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1d31 02-22 00:14:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 85 c4 eb 09 41 22 56 a3 3c b8 c6 e6 dd da 5f |.....A"V.<....._|
00000010 c7 97 ee 58 e2 f6 da a6 de 6a ad b9 71 a5 cc 72 |...X.....j..q..r|
[1d32 02-22 00:14:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 46 46 3c 49 e8 e0 c6 ff 4f dc |0E.!..FF<I....O.|
00000010 c5 39 d5 a6 9c 38 59 65 d1 53 4a 8c e9 5c 26 80 |.9...8Ye.SJ..\&.|
00000020 a3 a8 da c4 dd 02 20 34 92 df 6f 43 24 93 97 09 |...... 4..oC$...|
00000030 16 2c 9d 21 36 0e d5 bc a5 43 18 ee 02 cb 1a cc |.,.!6....C......|
00000040 d6 af 5c 8f 8c 25 88 |..\..%.|
[1d33 02-22 00:14:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1d34 02-22 00:14:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 fa 17 12 df 32 98 7c 95 69 ae |0E.!......2.|.i.|
00000010 a2 5d 29 68 46 2f ec 36 f7 8c e7 ba 42 2a 56 64 |.])hF/.6....B*Vd|
00000020 a8 8a 72 4a 66 02 20 3c 34 86 0f dd 70 94 f4 03 |..rJf. <4...p...|
00000030 9c b0 58 54 26 53 66 a7 51 1d 41 55 79 58 9e 8a |..XT&Sf.Q.AUyX..|
00000040 e8 ec d5 85 43 dd 9c |....C..|
[1d35 02-22 00:14:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[1d36 02-22 00:14:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[1d37 02-22 00:14:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:34
[1d38 02-22 00:14:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:34
[1d39 02-22 00:14:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[1d3a 02-22 00:14:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d3b 02-22 00:14:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d3c 02-22 00:14:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d3d 02-22 00:14:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d3e 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d3f 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d40 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[1d41 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d42 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[1d43 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes
[1d44 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d45 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes
[1d46 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d47 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes
[1d48 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1d49 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes
[1d4a 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d4b 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1d4c 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes
[1d4d 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d4e 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1d4f 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[1d50 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d51 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1d52 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1d53 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1d54 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1d55 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1d56 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1d57 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 3c 1b 45 fe 6a 89 5f 13 70 8d 7e 7a 2d 97 a4 |.<.E.j._.p.~z-..|
00000010 b1 f7 f5 23 60 7c d1 40 83 2a 12 9b 0f e4 30 88 |...#`|.@.*....0.|
[1d58 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 01 89 f7 65 cf 5d f1 30 61 28 14 |0D. t...e.].0a(.|
00000010 df 72 29 cd 49 1a a6 3f a2 41 71 26 c7 6e 8a 2e |.r).I..?.Aq&.n..|
00000020 ab 11 14 20 02 20 6c 43 fc 7a f0 b0 d9 10 9d a0 |... . lC.z......|
00000030 e6 24 59 09 5f 67 5f d0 1d a5 5e 52 91 1a f1 88 |.$Y._g_...^R....|
00000040 e8 6e b6 56 80 83 |.n.V..|
[1d59 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1d5a 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad9fe0 gate 1582330459293112400 evaluation starts
[1d5b 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad9fe0 signed by 0 principal evaluation starts (used [false])
[1d5c 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad9fe0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1d5d 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad9fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1d5e 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad9fe0 principal evaluation fails
[1d5f 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad9fe0 gate 1582330459293112400 evaluation fails
[1d60 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1d61 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1d62 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1d63 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 3c 1b 45 fe 6a 89 5f 13 70 8d 7e 7a 2d 97 a4 |.<.E.j._.p.~z-..|
00000010 b1 f7 f5 23 60 7c d1 40 83 2a 12 9b 0f e4 30 88 |...#`|.@.*....0.|
[1d64 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 01 89 f7 65 cf 5d f1 30 61 28 14 |0D. t...e.].0a(.|
00000010 df 72 29 cd 49 1a a6 3f a2 41 71 26 c7 6e 8a 2e |.r).I..?.Aq&.n..|
00000020 ab 11 14 20 02 20 6c 43 fc 7a f0 b0 d9 10 9d a0 |... . lC.z......|
00000030 e6 24 59 09 5f 67 5f d0 1d a5 5e 52 91 1a f1 88 |.$Y._g_...^R....|
00000040 e8 6e b6 56 80 83 |.n.V..|
[1d65 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1d66 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae88e0 gate 1582330459293517000 evaluation starts
[1d67 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae88e0 signed by 0 principal evaluation starts (used [false])
[1d68 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae88e0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1d69 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae88e0 principal evaluation succeeds for identity 0
[1d6a 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae88e0 gate 1582330459293517000 evaluation succeeds
[1d6b 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1d6c 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1d6d 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1d6e 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1d6f 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1d70 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes]}
[1d71 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:33
[1d72 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:33
[1d73 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[1d74 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d75 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d76 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d77 02-22 00:14:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d78 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1d79 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d7a 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1d7b 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d7c 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d7d 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d7e 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d7f 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d80 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d81 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d82 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d83 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1d84 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d85 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1d86 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1d87 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d88 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1d89 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d8a 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1d8b 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d8c 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes
[1d8d 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d8e 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes
[1d8f 02-22 00:14:19.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d90 02-22 00:14:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes
[1d91 02-22 00:14:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d92 02-22 00:14:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 558309598155745410, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 282 bytes, Signature: 0 bytes
[1d93 02-22 00:14:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d94 02-22 00:14:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 558309598155745410, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 282 bytes, Signature: 0 bytes
[1d95 02-22 00:14:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1d96 02-22 00:14:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 9f 3d 39 a9 65 b9 e3 59 45 cc 0a 3b 17 23 79 |..=9.e..YE..;.#y|
00000010 62 59 d4 37 73 db f0 b0 d3 c8 b9 04 2b 3b d1 d5 |bY.7s.......+;..|
[1d97 02-22 00:14:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 3a 33 66 35 95 cc 2a 9c 40 30 |0E.!..:3f5..*.@0|
00000010 ef 8d bf 7e ed c0 4b 56 af 8c 93 d7 4d 3e ed d6 |...~..KV....M>..|
00000020 37 cb 74 7f ec 02 20 64 18 49 79 f9 b9 8f f3 ff |7.t... d.Iy.....|
00000030 e7 a6 eb 4c 41 01 bc 12 12 91 3d c1 ef b7 52 83 |...LA.....=...R.|
00000040 a6 39 b5 40 aa 8f cf |.9.@...|
[1d98 02-22 00:14:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1d99 02-22 00:14:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 84 c7 ca a8 87 c9 63 a1 86 6f |0E.!........c..o|
00000010 15 cf 40 1c c5 de 3f 34 38 84 87 6a 0a 40 2d 9b |..@...?48..j.@-.|
00000020 ca ed b0 f7 d4 02 20 68 fb 0d bb 73 95 4a 2d 99 |...... h...s.J-.|
00000030 69 c8 a7 fa 54 b4 51 b0 dd 41 55 0a 44 9a 71 54 |i...T.Q..AU.D.qT|
00000040 59 7a 67 27 2b 21 49 |Yzg'+!I|
[1d9a 02-22 00:14:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1d9b 02-22 00:14:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[1d9c 02-22 00:14:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d9d 02-22 00:14:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1d9e 02-22 00:14:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 558309598155745410, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes to 1 peers
[1d9f 02-22 00:14:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[1da0 02-22 00:14:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 558309598155745410, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 548 bytes, Signature: 0 bytes
[1da1 02-22 00:14:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1da2 02-22 00:14:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15101E
[1da3 02-22 00:14:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E440B55664E3F5D533278A43D730CEB30E8367A404784C408D4766BDECCA59E5
[1da4 02-22 00:14:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[1da5 02-22 00:14:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[1da6 02-22 00:14:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[1da7 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[1da8 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[1da9 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510081801
[1daa 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F54FDCCE71384CA3F99B601FC4AA1A99F34B24800636D0F97D0F82C45C76E8BC
[1dab 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[1dac 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1dad 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1dae 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1daf 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1db0 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[1db1 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1db2 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1db3 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[1db5 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1db4 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1db6 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[1db7 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[1db9 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1dbb 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[1dbc 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes
[1dbd 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1db8 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1dbe 02-22 00:14:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1dba 02-22 00:14:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes
[1dc0 02-22 00:14:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1dbf 02-22 00:14:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1dc1 02-22 00:14:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1dc2 02-22 00:14:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1dc3 02-22 00:14:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[1dc4 02-22 00:14:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1dc5 02-22 00:14:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1dc6 02-22 00:14:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1dc7 02-22 00:14:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1dc8 02-22 00:14:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1dc9 02-22 00:14:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1dca 02-22 00:14:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1dcb 02-22 00:14:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1dcc 02-22 00:14:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1dcd 02-22 00:14:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 0e 22 ce db 5f 7d 3a 81 1b 44 f9 05 bf 05 18 |..".._}:..D.....|
00000010 23 a4 17 f2 7a 32 96 e9 55 a8 17 72 bf fb 8c fe |#...z2..U..r....|
[1dce 02-22 00:14:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 7d 0d 28 ed 29 87 2d f9 33 af a3 |0D. 8}.(.).-.3..|
00000010 6b 21 09 25 79 aa 62 0c e7 33 13 e4 53 29 ba 29 |k!.%y.b..3..S).)|
00000020 c1 b1 6f 89 02 20 13 e2 90 13 62 40 fd a5 54 90 |..o.. ....b@..T.|
00000030 52 ba 3d 62 90 35 5f 04 da d5 50 41 e8 77 25 df |R.=b.5_...PA.w%.|
00000040 45 c3 d8 f5 d1 58 |E....X|
[1dcf 02-22 00:14:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1dd0 02-22 00:14:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbd090 gate 1582330459430169300 evaluation starts
[1dd1 02-22 00:14:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbd090 signed by 0 principal evaluation starts (used [false])
[1dd2 02-22 00:14:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbd090 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1dd3 02-22 00:14:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbd090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1dd4 02-22 00:14:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbd090 principal evaluation fails
[1dd5 02-22 00:14:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbd090 gate 1582330459430169300 evaluation fails
[1dd6 02-22 00:14:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1dd7 02-22 00:14:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1dd8 02-22 00:14:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1dd9 02-22 00:14:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 0e 22 ce db 5f 7d 3a 81 1b 44 f9 05 bf 05 18 |..".._}:..D.....|
00000010 23 a4 17 f2 7a 32 96 e9 55 a8 17 72 bf fb 8c fe |#...z2..U..r....|
[1dda 02-22 00:14:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 7d 0d 28 ed 29 87 2d f9 33 af a3 |0D. 8}.(.).-.3..|
00000010 6b 21 09 25 79 aa 62 0c e7 33 13 e4 53 29 ba 29 |k!.%y.b..3..S).)|
00000020 c1 b1 6f 89 02 20 13 e2 90 13 62 40 fd a5 54 90 |..o.. ....b@..T.|
00000030 52 ba 3d 62 90 35 5f 04 da d5 50 41 e8 77 25 df |R.=b.5_...PA.w%.|
00000040 45 c3 d8 f5 d1 58 |E....X|
[1ddb 02-22 00:14:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1ddc 02-22 00:14:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbd990 gate 1582330459444347200 evaluation starts
[1ddd 02-22 00:14:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbd990 signed by 0 principal evaluation starts (used [false])
[1dde 02-22 00:14:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbd990 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1ddf 02-22 00:14:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbd990 principal evaluation succeeds for identity 0
[1de0 02-22 00:14:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbd990 gate 1582330459444347200 evaluation succeeds
[1de1 02-22 00:14:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1de2 02-22 00:14:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1de3 02-22 00:14:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1de4 02-22 00:14:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1de5 02-22 00:14:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1de6 02-22 00:14:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes]}
[1de7 02-22 00:14:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:31
[1de8 02-22 00:14:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:31
[1de9 02-22 00:14:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[1dea 02-22 00:14:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1deb 02-22 00:14:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1dec 02-22 00:14:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1dee 02-22 00:14:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ded 02-22 00:14:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1def 02-22 00:14:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1df0 02-22 00:14:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1df1 02-22 00:14:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1df2 02-22 00:14:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1df3 02-22 00:14:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1df4 02-22 00:14:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1df5 02-22 00:14:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1df6 02-22 00:14:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1df7 02-22 00:14:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1df8 02-22 00:14:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1df9 02-22 00:14:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1dfa 02-22 00:14:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1dfb 02-22 00:14:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1dfc 02-22 00:14:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1dfd 02-22 00:14:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[1dfe 02-22 00:14:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1dff 02-22 00:14:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e00 02-22 00:14:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes
[1e01 02-22 00:14:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e02 02-22 00:14:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 11166122692380403922, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 282 bytes, Signature: 0 bytes
[1e03 02-22 00:14:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e04 02-22 00:14:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 11166122692380403922, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 282 bytes, Signature: 0 bytes
[1e05 02-22 00:14:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1e06 02-22 00:14:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 80 9d 61 47 b4 1e 31 38 a1 9e d8 3d de 64 63 |...aG..18...=.dc|
00000010 df fd 06 03 7d fa 9d 51 3b 75 33 32 db d8 22 18 |....}..Q;u32..".|
[1e07 02-22 00:14:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 87 2b 09 59 c4 53 6d 08 00 e8 bd |0D. U.+.Y.Sm....|
00000010 a2 8c 64 75 e4 ac 64 02 b7 20 45 b0 c4 b6 5c c3 |..du..d.. E...\.|
00000020 d7 10 d1 87 02 20 1c 35 cf 7f db 01 78 b1 9d 9e |..... .5....x...|
00000030 29 3a 08 1f cb dc 39 90 5e 18 5d f5 39 c2 3f 0a |):....9.^.].9.?.|
00000040 ce 1e 2b 2e f9 c9 |..+...|
[1e08 02-22 00:14:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1e09 02-22 00:14:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef df 8d 3a 34 a1 12 a1 d1 d7 b8 |0E.!....:4......|
00000010 06 42 77 8e d9 d7 7e f0 11 33 cd 2b 98 3a e2 0d |.Bw...~..3.+.:..|
00000020 9d c5 0a f1 36 02 20 7e 55 9f 2d 4f 9e 43 37 6b |....6. ~U.-O.C7k|
00000030 f9 eb 3c 2b 09 ad b2 16 aa 3a c8 7f 25 9b da 2f |..<+.....:..%../|
00000040 11 6f 54 13 3e 43 20 |.oT.>C |
[1e0a 02-22 00:14:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e0b 02-22 00:14:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[1e0c 02-22 00:14:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e0d 02-22 00:14:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e0e 02-22 00:14:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 11166122692380403922, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 549 bytes, Signature: 0 bytes to 1 peers
[1e0f 02-22 00:14:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[1e10 02-22 00:14:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 11166122692380403922, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 549 bytes, Signature: 0 bytes
[1e11 02-22 00:14:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e12 02-22 00:14:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[1e13 02-22 00:14:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e14 02-22 00:14:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e15 02-22 00:14:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e16 02-22 00:14:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:1107384382505346797 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[1e17 02-22 00:14:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:1107384382505346797 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[1e18 02-22 00:14:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[1e19 02-22 00:14:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e1a 02-22 00:14:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[1e1b 02-22 00:14:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e1c 02-22 00:14:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e1d 02-22 00:14:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e1e 02-22 00:14:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e1f 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 16714010944219551836, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[1e20 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e21 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 16714010944219551836, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:13 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[1e22 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[1e23 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e24 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1e25 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1e26 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1e27 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1e28 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1e29 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1e2a 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 7b ba 6a b4 b7 46 24 ed 6d ce e5 03 1d 8c 22 |.{.j..F$.m....."|
00000010 e5 00 ba 6a 72 94 bd ba 4b b8 0f 8a 62 c4 7f 72 |...jr...K...b..r|
[1e2b 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 c0 c0 de 18 d9 05 c1 83 5f d8 |0E.!.........._.|
00000010 e5 c9 e9 9f 05 c9 fa ef 25 ba c4 76 dd c2 9b 75 |........%..v...u|
00000020 ca 01 79 f1 64 02 20 5d 58 4d 75 37 dd 0d 4a b5 |..y.d. ]XMu7..J.|
00000030 2b 6d 35 ab 85 df b8 b8 b4 35 30 5c 10 33 39 82 |+m5......50\.39.|
00000040 79 b9 21 b4 f6 a2 b9 |y.!....|
[1e2c 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1e2d 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c48230 gate 1582330460158851300 evaluation starts
[1e2e 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c48230 signed by 0 principal evaluation starts (used [false])
[1e2f 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c48230 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1e30 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c48230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1e31 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c48230 principal evaluation fails
[1e32 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c48230 gate 1582330460158851300 evaluation fails
[1e33 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1e34 02-22 00:14:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1e35 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1e36 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 7b ba 6a b4 b7 46 24 ed 6d ce e5 03 1d 8c 22 |.{.j..F$.m....."|
00000010 e5 00 ba 6a 72 94 bd ba 4b b8 0f 8a 62 c4 7f 72 |...jr...K...b..r|
[1e37 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 c0 c0 de 18 d9 05 c1 83 5f d8 |0E.!.........._.|
00000010 e5 c9 e9 9f 05 c9 fa ef 25 ba c4 76 dd c2 9b 75 |........%..v...u|
00000020 ca 01 79 f1 64 02 20 5d 58 4d 75 37 dd 0d 4a b5 |..y.d. ]XMu7..J.|
00000030 2b 6d 35 ab 85 df b8 b8 b4 35 30 5c 10 33 39 82 |+m5......50\.39.|
00000040 79 b9 21 b4 f6 a2 b9 |y.!....|
[1e38 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1e39 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c48b30 gate 1582330460161337900 evaluation starts
[1e3a 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c48b30 signed by 0 principal evaluation starts (used [false])
[1e3b 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c48b30 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1e3c 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c48b30 principal evaluation succeeds for identity 0
[1e3d 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c48b30 gate 1582330460161337900 evaluation succeeds
[1e3e 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1e3f 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1e40 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1e41 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1e42 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e43 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[1e44 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e45 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e46 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e47 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 16714010944219551836, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers
[1e48 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[1e49 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 16714010944219551836, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes
[1e4a 02-22 00:14:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e4b 02-22 00:14:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[1e4c 02-22 00:14:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[1e4d 02-22 00:14:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e4e 02-22 00:14:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e4f 02-22 00:14:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e50 02-22 00:14:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e51 02-22 00:14:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 9323612443726851571, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[1e52 02-22 00:14:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 9323612443726851571, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[1e53 02-22 00:14:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e54 02-22 00:14:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 9323612443726851571, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[1e55 02-22 00:14:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[1e56 02-22 00:14:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e57 02-22 00:14:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1e58 02-22 00:14:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1e59 02-22 00:14:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1e5a 02-22 00:14:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1e5b 02-22 00:14:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1e5c 02-22 00:14:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1e5d 02-22 00:14:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 ab e7 6e 4d 54 4e ea d2 90 5d f9 20 d5 37 08 |f..nMTN...]. .7.|
00000010 13 7f 30 8a 51 b3 70 57 36 69 55 d7 c6 50 fa a0 |..0.Q.pW6iU..P..|
[1e5e 02-22 00:14:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 1b 14 89 20 74 c8 02 c4 e1 2a |0E.!..... t....*|
00000010 0e ab d2 d5 bb 48 bc dd 78 d3 78 af 1a 23 86 ef |.....H..x.x..#..|
00000020 cf 60 e6 ed bb 02 20 10 9b d6 35 e4 4a a3 10 0e |.`.... ...5.J...|
00000030 71 25 d2 c2 22 78 08 00 1f 1b cc 92 35 66 2e 3e |q%.."x......5f.>|
00000040 41 dd 98 19 8a 84 7b |A.....{|
[1e5f 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1e60 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c69730 gate 1582330460610465500 evaluation starts
[1e61 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c69730 signed by 0 principal evaluation starts (used [false])
[1e62 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c69730 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1e63 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c69730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1e64 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c69730 principal evaluation fails
[1e65 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c69730 gate 1582330460610465500 evaluation fails
[1e66 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1e67 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1e68 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1e69 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 ab e7 6e 4d 54 4e ea d2 90 5d f9 20 d5 37 08 |f..nMTN...]. .7.|
00000010 13 7f 30 8a 51 b3 70 57 36 69 55 d7 c6 50 fa a0 |..0.Q.pW6iU..P..|
[1e6a 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 1b 14 89 20 74 c8 02 c4 e1 2a |0E.!..... t....*|
00000010 0e ab d2 d5 bb 48 bc dd 78 d3 78 af 1a 23 86 ef |.....H..x.x..#..|
00000020 cf 60 e6 ed bb 02 20 10 9b d6 35 e4 4a a3 10 0e |.`.... ...5.J...|
00000030 71 25 d2 c2 22 78 08 00 1f 1b cc 92 35 66 2e 3e |q%.."x......5f.>|
00000040 41 dd 98 19 8a 84 7b |A.....{|
[1e6b 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1e6c 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8a030 gate 1582330460613433000 evaluation starts
[1e6d 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8a030 signed by 0 principal evaluation starts (used [false])
[1e6e 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8a030 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1e6f 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8a030 principal evaluation succeeds for identity 0
[1e70 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8a030 gate 1582330460613433000 evaluation succeeds
[1e71 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1e72 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1e73 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1e74 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1e75 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e76 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[1e77 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e78 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e79 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e7a 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 9323612443726851571, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers
[1e7b 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[1e7c 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9323612443726851571, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes
[1e7d 02-22 00:14:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e7e 02-22 00:14:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:8761156531211174027 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1e7f 02-22 00:14:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:8761156531211174027 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1e80 02-22 00:14:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e81 02-22 00:14:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e82 02-22 00:14:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e83 02-22 00:14:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e84 02-22 00:14:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e85 02-22 00:14:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1e86 02-22 00:14:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[1e87 02-22 00:14:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e88 02-22 00:14:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:4179654925324948206 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1e89 02-22 00:14:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:4179654925324948206 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1e8a 02-22 00:14:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[1e8b 02-22 00:14:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e8c 02-22 00:14:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[1e8d 02-22 00:14:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e8e 02-22 00:14:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1e8f 02-22 00:14:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[1e90 02-22 00:14:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1e91 02-22 00:14:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[1e93 02-22 00:14:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17136541084288127308 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[1e94 02-22 00:14:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[1e92 02-22 00:14:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 35 09 f9 c5 d0 97 bf b0 f9 58 9e fc d1 84 e9 |.5........X.....|
00000010 0d d2 39 92 74 fc 9d 06 98 32 f9 d5 12 8c 12 d2 |..9.t....2......|
[1e96 02-22 00:14:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:9348052340845206141 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[1e95 02-22 00:14:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17136541084288127308 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1e97 02-22 00:14:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 83 3c da cb 43 27 7e ed 31 36 18 |0D. I.<..C'~.16.|
00000010 9f e7 3d 0e cc d1 0f 81 b7 25 a7 c5 b6 41 b8 d7 |..=......%...A..|
00000020 67 80 75 02 02 20 6b 1f 3c ca 33 b1 a5 24 41 7d |g.u.. k.<.3..$A}|
00000030 b1 4e 5e cf f9 b6 ae c3 e3 4e 8a a3 3b 5b 9b 48 |.N^......N..;[.H|
00000040 aa 5a 03 71 8c 4e |.Z.q.N|
[1e98 02-22 00:14:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[1e99 02-22 00:14:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:9348052340845206141 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1e9a 02-22 00:14:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e9b 02-22 00:14:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[1e9c 02-22 00:14:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17094362502012943134 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[1e9d 02-22 00:14:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1e9e 02-22 00:14:22.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 68 1c 0b b2 f8 84 f9 6c 7c a5 e7 |0D. Uh......l|..|
00000010 18 c4 e8 f0 5f 0d 5f bf 27 8b b0 a1 6d 8b 93 f4 |...._._.'...m...|
00000020 f2 18 e5 d0 02 20 0b f1 9b 88 ab 55 14 af 20 3f |..... .....U.. ?|
00000030 27 44 16 36 d4 f5 20 94 ff 25 24 84 f6 0c f3 e6 |'D.6.. ..%$.....|
00000040 fc 96 86 ab d6 45 |.....E|
[1e9f 02-22 00:14:22.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17094362502012943134 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[1ea1 02-22 00:14:22.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ea0 02-22 00:14:22.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1ea2 02-22 00:14:22.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[1ea3 02-22 00:14:22.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:35
[1ea4 02-22 00:14:22.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:35
[1ea5 02-22 00:14:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[1ea6 02-22 00:14:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ea7 02-22 00:14:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ea8 02-22 00:14:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ea9 02-22 00:14:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[1eaa 02-22 00:14:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1eab 02-22 00:14:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1eac 02-22 00:14:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ead 02-22 00:14:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[1eae 02-22 00:14:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[1eaf 02-22 00:14:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[1eb0 02-22 00:14:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[1eb1 02-22 00:14:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1eb3 02-22 00:14:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1eb2 02-22 00:14:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1eb4 02-22 00:14:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1eb5 02-22 00:14:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1eb6 02-22 00:14:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1eb7 02-22 00:14:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1eb8 02-22 00:14:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1eb9 02-22 00:14:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1eba 02-22 00:14:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 61 d1 8f 45 c8 49 37 fe da 4e 1e 63 cc 52 00 |.a..E.I7..N.c.R.|
00000010 22 9a 69 ce 42 c4 4f bb 0f 69 89 f5 22 83 94 4e |".i.B.O..i.."..N|
[1ebb 02-22 00:14:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc af 08 ac 64 3e 1e 56 14 79 51 |0E.!.....d>.V.yQ|
00000010 7b 43 fd 90 c2 71 5e 25 0e cb 8c 4c 5b e0 22 70 |{C...q^%...L[."p|
00000020 b1 79 da 37 7f 02 20 12 9f 52 10 e0 cd 2f 45 e2 |.y.7.. ..R.../E.|
00000030 4a 4d 12 eb d7 b6 c4 61 ea 72 29 ed 3e a6 02 4d |JM.....a.r).>..M|
00000040 c5 b8 4d 92 9a a8 48 |..M...H|
[1ebc 02-22 00:14:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9348052340845206141 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 154 bytes, Signature: 0 bytes
[1ebd 02-22 00:14:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9348052340845206141 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 154 bytes, Signature: 0 bytes
[1ebe 02-22 00:14:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1ebf 02-22 00:14:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ec0 02-22 00:14:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ced1c0 gate 1582330462396164300 evaluation starts
[1ec1 02-22 00:14:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ced1c0 signed by 0 principal evaluation starts (used [false])
[1ec2 02-22 00:14:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ced1c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1ec3 02-22 00:14:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ced1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1ec4 02-22 00:14:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ced1c0 principal evaluation fails
[1ec6 02-22 00:14:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17136541084288127308 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[1ec7 02-22 00:14:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17136541084288127308 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[1ec8 02-22 00:14:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ec9 02-22 00:14:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15101F
[1eca 02-22 00:14:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E64E0363D5FEF3C1D6D44F5FA174F13DB6DD0EA27D798348A09DB83FEA740D08
[1ec5 02-22 00:14:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ced1c0 gate 1582330462396164300 evaluation fails
[1ecb 02-22 00:14:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1ecc 02-22 00:14:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[1ece 02-22 00:14:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[1ecf 02-22 00:14:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1ed0 02-22 00:14:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1ed1 02-22 00:14:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 61 d1 8f 45 c8 49 37 fe da 4e 1e 63 cc 52 00 |.a..E.I7..N.c.R.|
00000010 22 9a 69 ce 42 c4 4f bb 0f 69 89 f5 22 83 94 4e |".i.B.O..i.."..N|
[1ed2 02-22 00:14:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ed3 02-22 00:14:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[1ed4 02-22 00:14:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc af 08 ac 64 3e 1e 56 14 79 51 |0E.!.....d>.V.yQ|
00000010 7b 43 fd 90 c2 71 5e 25 0e cb 8c 4c 5b e0 22 70 |{C...q^%...L[."p|
00000020 b1 79 da 37 7f 02 20 12 9f 52 10 e0 cd 2f 45 e2 |.y.7.. ..R.../E.|
00000030 4a 4d 12 eb d7 b6 c4 61 ea 72 29 ed 3e a6 02 4d |JM.....a.r).>..M|
00000040 c5 b8 4d 92 9a a8 48 |..M...H|
[1ed5 02-22 00:14:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[1ed6 02-22 00:14:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1ed8 02-22 00:14:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cedac0 gate 1582330462462135900 evaluation starts
[1ed7 02-22 00:14:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ecd 02-22 00:14:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:8704670965032276844 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1ed9 02-22 00:14:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1eda 02-22 00:14:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cedac0 signed by 0 principal evaluation starts (used [false])
[1edb 02-22 00:14:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[1edc 02-22 00:14:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[1ee2 02-22 00:14:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ede 02-22 00:14:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1edd 02-22 00:14:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17094362502012943134 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 154 bytes, Signature: 0 bytes
[1ee3 02-22 00:14:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[1edf 02-22 00:14:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cedac0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1ee4 02-22 00:14:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cedac0 principal evaluation succeeds for identity 0
[1ee5 02-22 00:14:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cedac0 gate 1582330462462135900 evaluation succeeds
[1ee6 02-22 00:14:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1ee7 02-22 00:14:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1ee8 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1ee9 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1eea 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes
[1eeb 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes]}
[1eec 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:32
[1eed 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:32
[1eee 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[1eef 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ef0 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ef1 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ef2 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[1ee0 02-22 00:14:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:8704670965032276844 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1ef3 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:8704670965032276844 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[1ef4 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ef5 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ef6 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ef7 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ef8 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1ef9 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1efa 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[1efb 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1efc 02-22 00:14:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17094362502012943134 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 154 bytes, Signature: 0 bytes
[1efd 02-22 00:14:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1efe 02-22 00:14:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17094362502012943134 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 154 bytes, Signature: 0 bytes
[1eff 02-22 00:14:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f00 02-22 00:14:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[1f01 02-22 00:14:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f02 02-22 00:14:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f03 02-22 00:14:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f04 02-22 00:14:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[1f05 02-22 00:14:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[1f06 02-22 00:14:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[1f07 02-22 00:14:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1ee1 02-22 00:14:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[1f08 02-22 00:14:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f09 02-22 00:14:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[1f0a 02-22 00:14:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[1f0b 02-22 00:14:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f0c 02-22 00:14:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1f0d 02-22 00:14:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1f0e 02-22 00:14:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1f0f 02-22 00:14:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1f10 02-22 00:14:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1f11 02-22 00:14:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1f13 02-22 00:14:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[1f14 02-22 00:14:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[1f12 02-22 00:14:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 d7 d9 72 8a f8 c9 ed 13 69 f9 9c 9b c1 7e 6e |...r.....i....~n|
00000010 f5 9f 86 ce b7 6d d6 33 49 9d 6a 6d 95 da 26 a6 |.....m.3I.jm..&.|
[1f15 02-22 00:14:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e cb 2c 25 55 f6 a9 49 e4 8f 02 ca |0D. >.,%U..I....|
00000010 8e 45 52 47 58 35 3f ca 1b e6 43 4f 91 1f bc fa |.ERGX5?...CO....|
00000020 e5 17 e0 9d 02 20 51 7d 07 1a cc 2c b1 fb c2 04 |..... Q}...,....|
00000030 5a ec 74 92 27 20 5d b7 24 0f 4a d0 ac ea 2d 96 |Z.t.' ].$.J...-.|
00000040 43 21 58 64 05 de |C!Xd..|
[1f16 02-22 00:14:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1f17 02-22 00:14:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6ad60 gate 1582330462664241800 evaluation starts
[1f18 02-22 00:14:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6ad60 signed by 0 principal evaluation starts (used [false])
[1f19 02-22 00:14:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6ad60 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1f1a 02-22 00:14:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6ad60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1f1b 02-22 00:14:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6ad60 principal evaluation fails
[1f1c 02-22 00:14:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6ad60 gate 1582330462664241800 evaluation fails
[1f1d 02-22 00:14:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1f1e 02-22 00:14:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1f1f 02-22 00:14:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1f20 02-22 00:14:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 d7 d9 72 8a f8 c9 ed 13 69 f9 9c 9b c1 7e 6e |...r.....i....~n|
00000010 f5 9f 86 ce b7 6d d6 33 49 9d 6a 6d 95 da 26 a6 |.....m.3I.jm..&.|
[1f21 02-22 00:14:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e cb 2c 25 55 f6 a9 49 e4 8f 02 ca |0D. >.,%U..I....|
00000010 8e 45 52 47 58 35 3f ca 1b e6 43 4f 91 1f bc fa |.ERGX5?...CO....|
00000020 e5 17 e0 9d 02 20 51 7d 07 1a cc 2c b1 fb c2 04 |..... Q}...,....|
00000030 5a ec 74 92 27 20 5d b7 24 0f 4a d0 ac ea 2d 96 |Z.t.' ].$.J...-.|
00000040 43 21 58 64 05 de |C!Xd..|
[1f22 02-22 00:14:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1f23 02-22 00:14:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6b660 gate 1582330462677981300 evaluation starts
[1f24 02-22 00:14:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6b660 signed by 0 principal evaluation starts (used [false])
[1f25 02-22 00:14:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6b660 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1f26 02-22 00:14:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6b660 principal evaluation succeeds for identity 0
[1f27 02-22 00:14:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6b660 gate 1582330462677981300 evaluation succeeds
[1f28 02-22 00:14:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1f29 02-22 00:14:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1f2a 02-22 00:14:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1f2b 02-22 00:14:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1f2c 02-22 00:14:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes
[1f2d 02-22 00:14:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes]}
[1f2e 02-22 00:14:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:34
[1f2f 02-22 00:14:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:34
[1f30 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[1f31 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f32 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f33 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f34 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[1f37 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[1f35 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[1f38 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f39 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 4e 03 63 d5 fe f3 c1 d6 d4 4f 5f a1 74 f1 3d |.N.c......O_.t.=|
00000010 b6 dd 0e a2 7d 79 83 48 a0 9d b8 3f ea 74 0d 08 |....}y.H...?.t..|
[1f3b 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 62 10 6b ab c8 3e 6c d3 25 80 |0E.!..b.k..>l.%.|
00000010 9d 2b 2e 1f dc e6 63 49 e7 5a b3 72 69 87 a3 ae |.+....cI.Z.ri...|
00000020 82 04 a9 f7 69 02 20 60 2c d8 48 9a 84 87 eb bc |....i. `,.H.....|
00000030 8e 66 e2 98 77 69 5a fe 01 aa 86 37 89 c1 9d dc |.f..wiZ....7....|
00000040 a2 fd 13 34 e2 4f 9f |...4.O.|
[1f3a 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f3c 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f3d 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[1f3e 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[1f3f 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[1f40 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f36 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f41 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[1f42 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes
[1f43 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes
[1f44 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f45 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1f46 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 35 09 f9 c5 d0 97 bf b0 f9 58 9e fc d1 84 e9 |.5........X.....|
00000010 0d d2 39 92 74 fc 9d 06 98 32 f9 d5 12 8c 12 d2 |..9.t....2......|
[1f47 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 83 3c da cb 43 27 7e ed 31 36 18 |0D. I.<..C'~.16.|
00000010 9f e7 3d 0e cc d1 0f 81 b7 25 a7 c5 b6 41 b8 d7 |..=......%...A..|
00000020 67 80 75 02 02 20 6b 1f 3c ca 33 b1 a5 24 41 7d |g.u.. k.<.3..$A}|
00000030 b1 4e 5e cf f9 b6 ae c3 e3 4e 8a a3 3b 5b 9b 48 |.N^......N..;[.H|
00000040 aa 5a 03 71 8c 4e |.Z.q.N|
[1f48 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[1f49 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f4a 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[1f4b 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f4c 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1f4d 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1f4e 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1f4f 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1f50 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1f51 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1f52 02-22 00:14:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 d7 d9 72 8a f8 c9 ed 13 69 f9 9c 9b c1 7e 6e |...r.....i....~n|
00000010 f5 9f 86 ce b7 6d d6 33 49 9d 6a 6d 95 da 26 a6 |.....m.3I.jm..&.|
[1f53 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e cb 2c 25 55 f6 a9 49 e4 8f 02 ca |0D. >.,%U..I....|
00000010 8e 45 52 47 58 35 3f ca 1b e6 43 4f 91 1f bc fa |.ERGX5?...CO....|
00000020 e5 17 e0 9d 02 20 51 7d 07 1a cc 2c b1 fb c2 04 |..... Q}...,....|
00000030 5a ec 74 92 27 20 5d b7 24 0f 4a d0 ac ea 2d 96 |Z.t.' ].$.J...-.|
00000040 43 21 58 64 05 de |C!Xd..|
[1f54 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1f55 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9b3c0 gate 1582330462793195600 evaluation starts
[1f56 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9b3c0 signed by 0 principal evaluation starts (used [false])
[1f57 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9b3c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1f58 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9b3c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1f59 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9b3c0 principal evaluation fails
[1f5a 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9b3c0 gate 1582330462793195600 evaluation fails
[1f5b 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1f5c 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1f5d 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1f5e 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 d7 d9 72 8a f8 c9 ed 13 69 f9 9c 9b c1 7e 6e |...r.....i....~n|
00000010 f5 9f 86 ce b7 6d d6 33 49 9d 6a 6d 95 da 26 a6 |.....m.3I.jm..&.|
[1f5f 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e cb 2c 25 55 f6 a9 49 e4 8f 02 ca |0D. >.,%U..I....|
00000010 8e 45 52 47 58 35 3f ca 1b e6 43 4f 91 1f bc fa |.ERGX5?...CO....|
00000020 e5 17 e0 9d 02 20 51 7d 07 1a cc 2c b1 fb c2 04 |..... Q}...,....|
00000030 5a ec 74 92 27 20 5d b7 24 0f 4a d0 ac ea 2d 96 |Z.t.' ].$.J...-.|
00000040 43 21 58 64 05 de |C!Xd..|
[1f60 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1f61 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9bcc0 gate 1582330462793674400 evaluation starts
[1f62 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9bcc0 signed by 0 principal evaluation starts (used [false])
[1f63 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9bcc0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1f64 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9bcc0 principal evaluation succeeds for identity 0
[1f65 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9bcc0 gate 1582330462793674400 evaluation succeeds
[1f66 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1f67 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1f68 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1f69 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1f6a 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes
[1f6b 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f6c 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f6d 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[1f6e 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f6f 02-22 00:14:22.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[1f70 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[1f71 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 4e 03 63 d5 fe f3 c1 d6 d4 4f 5f a1 74 f1 3d |.N.c......O_.t.=|
00000010 b6 dd 0e a2 7d 79 83 48 a0 9d b8 3f ea 74 0d 08 |....}y.H...?.t..|
[1f72 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 62 10 6b ab c8 3e 6c d3 25 80 |0E.!..b.k..>l.%.|
00000010 9d 2b 2e 1f dc e6 63 49 e7 5a b3 72 69 87 a3 ae |.+....cI.Z.ri...|
00000020 82 04 a9 f7 69 02 20 60 2c d8 48 9a 84 87 eb bc |....i. `,.H.....|
00000030 8e 66 e2 98 77 69 5a fe 01 aa 86 37 89 c1 9d dc |.f..wiZ....7....|
00000040 a2 fd 13 34 e2 4f 9f |...4.O.|
[1f73 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[1f74 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 2d 84 6d 1f 61 cf 49 43 9d 34 6f |0D. u-.m.a.IC.4o|
00000010 54 22 b7 51 d0 55 3e e5 fc 2d 25 eb 8c bb bd 3a |T".Q.U>..-%....:|
00000020 4f 12 b7 4c 02 20 21 79 f6 65 4a b3 92 12 40 ec |O..L. !y.eJ...@.|
00000030 95 c8 d3 b1 00 f1 f6 46 17 0d c2 b2 86 10 46 e8 |.......F......F.|
00000040 06 a6 96 eb 67 e3 |....g.|
[1f75 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1f76 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[1f77 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f78 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f79 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f7a 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[1f7b 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[1f7c 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1f7d 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1f7e 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1f7f 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1f80 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1f81 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1f82 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1f83 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 61 d1 8f 45 c8 49 37 fe da 4e 1e 63 cc 52 00 |.a..E.I7..N.c.R.|
00000010 22 9a 69 ce 42 c4 4f bb 0f 69 89 f5 22 83 94 4e |".i.B.O..i.."..N|
[1f84 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc af 08 ac 64 3e 1e 56 14 79 51 |0E.!.....d>.V.yQ|
00000010 7b 43 fd 90 c2 71 5e 25 0e cb 8c 4c 5b e0 22 70 |{C...q^%...L[."p|
00000020 b1 79 da 37 7f 02 20 12 9f 52 10 e0 cd 2f 45 e2 |.y.7.. ..R.../E.|
00000030 4a 4d 12 eb d7 b6 c4 61 ea 72 29 ed 3e a6 02 4d |JM.....a.r).>..M|
00000040 c5 b8 4d 92 9a a8 48 |..M...H|
[1f85 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1f86 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4e40 gate 1582330462807968400 evaluation starts
[1f87 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4e40 signed by 0 principal evaluation starts (used [false])
[1f88 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4e40 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1f89 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4e40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1f8a 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4e40 principal evaluation fails
[1f8b 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4e40 gate 1582330462807968400 evaluation fails
[1f8c 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1f8d 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1f8e 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1f8f 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 61 d1 8f 45 c8 49 37 fe da 4e 1e 63 cc 52 00 |.a..E.I7..N.c.R.|
00000010 22 9a 69 ce 42 c4 4f bb 0f 69 89 f5 22 83 94 4e |".i.B.O..i.."..N|
[1f90 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc af 08 ac 64 3e 1e 56 14 79 51 |0E.!.....d>.V.yQ|
00000010 7b 43 fd 90 c2 71 5e 25 0e cb 8c 4c 5b e0 22 70 |{C...q^%...L[."p|
00000020 b1 79 da 37 7f 02 20 12 9f 52 10 e0 cd 2f 45 e2 |.y.7.. ..R.../E.|
00000030 4a 4d 12 eb d7 b6 c4 61 ea 72 29 ed 3e a6 02 4d |JM.....a.r).>..M|
00000040 c5 b8 4d 92 9a a8 48 |..M...H|
[1f91 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1f92 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc5740 gate 1582330462808474400 evaluation starts
[1f93 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc5740 signed by 0 principal evaluation starts (used [false])
[1f94 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc5740 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1f95 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc5740 principal evaluation succeeds for identity 0
[1f96 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc5740 gate 1582330462808474400 evaluation succeeds
[1f97 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1f98 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1f99 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1f9a 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1f9b 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes
[1f9c 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1f9d 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[1f9e 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 4e 03 63 d5 fe f3 c1 d6 d4 4f 5f a1 74 f1 3d |.N.c......O_.t.=|
00000010 b6 dd 0e a2 7d 79 83 48 a0 9d b8 3f ea 74 0d 08 |....}y.H...?.t..|
[1f9f 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 62 10 6b ab c8 3e 6c d3 25 80 |0E.!..b.k..>l.%.|
00000010 9d 2b 2e 1f dc e6 63 49 e7 5a b3 72 69 87 a3 ae |.+....cI.Z.ri...|
00000020 82 04 a9 f7 69 02 20 60 2c d8 48 9a 84 87 eb bc |....i. `,.H.....|
00000030 8e 66 e2 98 77 69 5a fe 01 aa 86 37 89 c1 9d dc |.f..wiZ....7....|
00000040 a2 fd 13 34 e2 4f 9f |...4.O.|
[1fa0 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes
[1fa1 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes
[1fa2 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1fa3 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[1fa4 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 35 09 f9 c5 d0 97 bf b0 f9 58 9e fc d1 84 e9 |.5........X.....|
00000010 0d d2 39 92 74 fc 9d 06 98 32 f9 d5 12 8c 12 d2 |..9.t....2......|
[1fa5 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 83 3c da cb 43 27 7e ed 31 36 18 |0D. I.<..C'~.16.|
00000010 9f e7 3d 0e cc d1 0f 81 b7 25 a7 c5 b6 41 b8 d7 |..=......%...A..|
00000020 67 80 75 02 02 20 6b 1f 3c ca 33 b1 a5 24 41 7d |g.u.. k.<.3..$A}|
00000030 b1 4e 5e cf f9 b6 ae c3 e3 4e 8a a3 3b 5b 9b 48 |.N^......N..;[.H|
00000040 aa 5a 03 71 8c 4e |.Z.q.N|
[1fa6 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[1fa7 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1fa8 02-22 00:14:22.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1fa9 02-22 00:14:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1faa 02-22 00:14:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1fab 02-22 00:14:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[1fac 02-22 00:14:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[1fad 02-22 00:14:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1fae 02-22 00:14:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[1faf 02-22 00:14:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1fb0 02-22 00:14:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[1fb1 02-22 00:14:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1fb2 02-22 00:14:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[1fb3 02-22 00:14:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[1fb4 02-22 00:14:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[1fb5 02-22 00:14:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[1fb6 02-22 00:14:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[1fb7 02-22 00:14:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1fb8 02-22 00:14:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1fb9 02-22 00:14:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[1fba 02-22 00:14:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1fbb 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1fbc 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1fbd 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1fbe 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1fbf 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1fc0 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1fc1 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1fc2 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1fc3 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15ca0 gate 1582330463152097300 evaluation starts
[1fc4 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15ca0 signed by 0 principal evaluation starts (used [false])
[1fc5 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15ca0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1fc6 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1fc7 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15ca0 principal evaluation fails
[1fc8 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e15ca0 gate 1582330463152097300 evaluation fails
[1fc9 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1fca 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1fcb 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1fcc 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[1fcd 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[1fce 02-22 00:14:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1fcf 02-22 00:14:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e445a0 gate 1582330463168130500 evaluation starts
[1fd0 02-22 00:14:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e445a0 signed by 0 principal evaluation starts (used [false])
[1fd1 02-22 00:14:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e445a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[1fd2 02-22 00:14:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e445a0 principal evaluation succeeds for identity 0
[1fd3 02-22 00:14:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e445a0 gate 1582330463168130500 evaluation succeeds
[1fd4 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1fd5 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1fd6 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1fd7 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1fd8 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1fd9 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[1fda 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[1fdb 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1fdc 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1fdd 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1fde 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12267284751159473594 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[1fdf 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[1fe1 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[1fe2 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[1fe3 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[1fe4 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[1fe5 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[1fe6 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[1fe0 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12267284751159473594 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[1fe7 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1fe9 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[1fea 02-22 00:14:23.21 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1feb 02-22 00:14:23.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a2000 gate 1582330463216178800 evaluation starts
[1fe8 02-22 00:14:23.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[1fec 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a2000 signed by 0 principal evaluation starts (used [false])
[1fed 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a2000 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1fee 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a2000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[1fef 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a2000 principal evaluation fails
[1ff0 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a2000 gate 1582330463216178800 evaluation fails
[1ff1 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[1ff2 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[1ff3 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[1ff4 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[1ff5 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[1ff6 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[1ff7 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a29f0 gate 1582330463241898200 evaluation starts
[1ff8 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a29f0 signed by 0 principal evaluation starts (used [false])
[1ff9 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a29f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[1ffa 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a29f0 principal evaluation succeeds for identity 0
[1ffb 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a29f0 gate 1582330463241898200 evaluation succeeds
[1ffc 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[1ffd 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[1ffe 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[1fff 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2000 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2001 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[2002 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2003 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2004 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2005 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2006 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2007 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2008 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2009 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[200a 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[200b 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[200c 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[200d 02-22 00:14:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[200e 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006210700 gate 1582330463250684600 evaluation starts
[200f 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006210700 signed by 0 principal evaluation starts (used [false])
[2010 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006210700 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2011 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006210700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2012 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006210700 principal evaluation fails
[2013 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006210700 gate 1582330463250684600 evaluation fails
[2014 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2015 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2016 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2017 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2018 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2019 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[201a 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006211000 gate 1582330463251569300 evaluation starts
[201b 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006211000 signed by 0 principal evaluation starts (used [false])
[201c 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006211000 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[201d 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006211000 principal evaluation succeeds for identity 0
[201e 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006211000 gate 1582330463251569300 evaluation succeeds
[201f 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2020 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2021 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2022 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2023 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[2024 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[2025 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[2026 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[2027 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2028 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2029 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[202a 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[202b 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[202c 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[202d 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[202e 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[202f 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[2030 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2031 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2032 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062297c0 gate 1582330463253492000 evaluation starts
[2033 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062297c0 signed by 0 principal evaluation starts (used [false])
[2034 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062297c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2035 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062297c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2036 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062297c0 principal evaluation fails
[2037 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062297c0 gate 1582330463253492000 evaluation fails
[2038 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2039 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[203a 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[203b 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[203c 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[203d 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[203e 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062320c0 gate 1582330463254095600 evaluation starts
[203f 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062320c0 signed by 0 principal evaluation starts (used [false])
[2040 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062320c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2041 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062320c0 principal evaluation succeeds for identity 0
[2042 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062320c0 gate 1582330463254095600 evaluation succeeds
[2043 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2044 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2045 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2046 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2047 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2048 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[2049 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[204a 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[204b 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[204c 02-22 00:14:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[204d 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[204e 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[204f 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2050 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2051 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2052 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[2053 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2054 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2055 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006233dd0 gate 1582330463262936600 evaluation starts
[2056 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006233dd0 signed by 0 principal evaluation starts (used [false])
[2057 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006233dd0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2058 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006233dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2059 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006233dd0 principal evaluation fails
[205a 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006233dd0 gate 1582330463262936600 evaluation fails
[205b 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[205c 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[205d 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[205e 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[205f 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2060 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2061 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062506d0 gate 1582330463266501600 evaluation starts
[2062 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062506d0 signed by 0 principal evaluation starts (used [false])
[2063 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062506d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2064 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062506d0 principal evaluation succeeds for identity 0
[2065 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062506d0 gate 1582330463266501600 evaluation succeeds
[2066 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2067 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2068 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2069 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[206a 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[206b 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[206c 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[206d 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[206e 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[206f 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2070 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2071 02-22 00:14:23.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2072 02-22 00:14:23.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2073 02-22 00:14:23.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2074 02-22 00:14:23.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2075 02-22 00:14:23.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2076 02-22 00:14:23.28 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2077 02-22 00:14:23.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062687e0 gate 1582330463289637900 evaluation starts
[2078 02-22 00:14:23.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062687e0 signed by 0 principal evaluation starts (used [false])
[2079 02-22 00:14:23.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062687e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[207a 02-22 00:14:23.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062687e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[207b 02-22 00:14:23.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062687e0 principal evaluation fails
[207c 02-22 00:14:23.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062687e0 gate 1582330463289637900 evaluation fails
[207d 02-22 00:14:23.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[207e 02-22 00:14:23.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[207f 02-22 00:14:23.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2080 02-22 00:14:23.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2081 02-22 00:14:23.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2082 02-22 00:14:23.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2083 02-22 00:14:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062690e0 gate 1582330463307633300 evaluation starts
[2084 02-22 00:14:23.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062690e0 signed by 0 principal evaluation starts (used [false])
[2085 02-22 00:14:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062690e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2086 02-22 00:14:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062690e0 principal evaluation succeeds for identity 0
[2087 02-22 00:14:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062690e0 gate 1582330463307633300 evaluation succeeds
[2088 02-22 00:14:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2089 02-22 00:14:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[208a 02-22 00:14:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[208b 02-22 00:14:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[208c 02-22 00:14:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[208d 02-22 00:14:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[208e 02-22 00:14:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[208f 02-22 00:14:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12267284751159473594 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[2090 02-22 00:14:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12267284751159473594 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[2091 02-22 00:14:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2092 02-22 00:14:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s
[2093 02-22 00:14:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[2094 02-22 00:14:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2095 02-22 00:14:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2096 02-22 00:14:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2097 02-22 00:14:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16581456414270601392 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[2098 02-22 00:14:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16581456414270601392 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[2099 02-22 00:14:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[209a 02-22 00:14:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[209b 02-22 00:14:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[209c 02-22 00:14:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[209d 02-22 00:14:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[209e 02-22 00:14:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[209f 02-22 00:14:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20a0 02-22 00:14:24.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[20a1 02-22 00:14:24.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20a2 02-22 00:14:24.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[20a3 02-22 00:14:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[20a4 02-22 00:14:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 66 a3 91 c2 b1 02 2f 15 ae 43 0e 84 e3 5b 3b |.f...../..C...[;|
00000010 b1 43 84 2d 40 dc 48 a0 3b 20 05 ce 2c 20 e0 77 |.C.-@.H.; .., .w|
[20a5 02-22 00:14:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad ad cd 36 a5 38 db 8d fb 4b 80 |0E.!....6.8...K.|
00000010 af 7e 33 91 ad 49 ee a3 a9 24 a0 41 23 ff 8d b0 |.~3..I...$.A#...|
00000020 06 66 e0 85 d5 02 20 5d f0 3b 2f 65 af 9a e4 cf |.f.... ].;/e....|
00000030 1b 28 a7 a0 33 af 10 e1 23 93 df 06 cc 3f 61 84 |.(..3...#....?a.|
00000040 78 d3 3a 67 71 e1 8b |x.:gq..|
[20a6 02-22 00:14:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[20a7 02-22 00:14:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 bb 53 89 6a 24 31 98 78 d3 2c |0E.!...S.j$1.x.,|
00000010 b2 fa b8 90 a3 78 96 bc fe d1 01 fa ce fe 70 f1 |.....x........p.|
00000020 8e 4d c5 b8 88 02 20 2b b1 c7 9c 5e a1 ad 79 5c |.M.... +...^..y\|
00000030 fe cf c1 54 57 87 2a 23 bb a1 b6 a6 6a 54 98 53 |...TW.*#....jT.S|
00000040 e1 36 30 ff 1c 5c 5f |.60..\_|
[20a8 02-22 00:14:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[20a9 02-22 00:14:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[20aa 02-22 00:14:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:36
[20ab 02-22 00:14:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:36
[20ac 02-22 00:14:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[20ad 02-22 00:14:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20ae 02-22 00:14:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20af 02-22 00:14:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20b0 02-22 00:14:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20b1 02-22 00:14:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20b2 02-22 00:14:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20b3 02-22 00:14:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[20b4 02-22 00:14:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes
[20b5 02-22 00:14:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20b6 02-22 00:14:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20b7 02-22 00:14:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes
[20b8 02-22 00:14:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20b9 02-22 00:14:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes
[20ba 02-22 00:14:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20bb 02-22 00:14:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[20bc 02-22 00:14:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes
[20bd 02-22 00:14:24.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20be 02-22 00:14:24.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[20bf 02-22 00:14:24.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[20c0 02-22 00:14:24.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[20c1 02-22 00:14:24.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20c2 02-22 00:14:24.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[20c3 02-22 00:14:24.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20c4 02-22 00:14:24.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20c5 02-22 00:14:24.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20c6 02-22 00:14:24.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20c7 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[20c8 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[20c9 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20ca 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[20cb 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[20cc 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[20cd 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[20ce 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[20cf 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[20d0 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 b3 ed d4 4d 68 d5 16 9f d5 96 d9 48 18 4e 08 |u...Mh......H.N.|
00000010 d7 f0 fb e2 ec ff 70 89 a7 89 38 55 87 b8 08 75 |......p...8U...u|
[20d1 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a 76 79 7e 6c 63 af 1e 6c 60 c7 c7 |0D. Zvy~lc..l`..|
00000010 8c d9 98 10 c7 40 d2 2f e9 1c 40 d4 05 20 77 5b |.....@./..@.. w[|
00000020 38 d2 b7 b8 02 20 6a 0a 50 70 e0 31 a9 eb 6d f5 |8.... j.Pp.1..m.|
00000030 79 8a 15 69 be 1c 71 06 07 c8 39 f9 1f fa 4e 32 |y..i..q...9...N2|
00000040 45 f6 7f 27 4a ef |E..'J.|
[20d2 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[20d3 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2970 gate 1582330464366855500 evaluation starts
[20d4 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2970 signed by 0 principal evaluation starts (used [false])
[20d5 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2970 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[20d6 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[20d7 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2970 principal evaluation fails
[20d8 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2970 gate 1582330464366855500 evaluation fails
[20d9 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[20da 02-22 00:14:24.40 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[20db 02-22 00:14:24.40 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[20dc 02-22 00:14:24.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510091801
[20dd 02-22 00:14:24.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C62A5BDB5FCF6B4C3C45ABF2FF284EBB9B551A84EF2734609C0168580FFE8362
[20de 02-22 00:14:24.40 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[20df 02-22 00:14:24.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20e0 02-22 00:14:24.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20e1 02-22 00:14:24.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151020
[20e3 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4BA61147899B7E83EFAC78D9C66712E74868B92B9F6D348AE3D2E3470BE395D8
[20e4 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20e5 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[20e6 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[20e2 02-22 00:14:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[20e8 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[20e9 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 b3 ed d4 4d 68 d5 16 9f d5 96 d9 48 18 4e 08 |u...Mh......H.N.|
00000010 d7 f0 fb e2 ec ff 70 89 a7 89 38 55 87 b8 08 75 |......p...8U...u|
[20ea 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a 76 79 7e 6c 63 af 1e 6c 60 c7 c7 |0D. Zvy~lc..l`..|
00000010 8c d9 98 10 c7 40 d2 2f e9 1c 40 d4 05 20 77 5b |.....@./..@.. w[|
00000020 38 d2 b7 b8 02 20 6a 0a 50 70 e0 31 a9 eb 6d f5 |8.... j.Pp.1..m.|
00000030 79 8a 15 69 be 1c 71 06 07 c8 39 f9 1f fa 4e 32 |y..i..q...9...N2|
00000040 45 f6 7f 27 4a ef |E..'J.|
[20eb 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes
[20ec 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes
[20e7 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[20ed 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[20ee 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5dac0 gate 1582330464414265500 evaluation starts
[20ef 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5dac0 signed by 0 principal evaluation starts (used [false])
[20f0 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5dac0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[20f1 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5dac0 principal evaluation succeeds for identity 0
[20f2 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5dac0 gate 1582330464414265500 evaluation succeeds
[20f3 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[20f4 02-22 00:14:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[20f5 02-22 00:14:24.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[20f7 02-22 00:14:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[20f6 02-22 00:14:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[20f8 02-22 00:14:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[20f9 02-22 00:14:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[20fa 02-22 00:14:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes]}
[20fb 02-22 00:14:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:35
[20fc 02-22 00:14:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:35
[20fd 02-22 00:14:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[20fe 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2100 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[2101 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[20ff 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2102 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2103 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[2104 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2105 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2106 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes
[2108 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2107 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2109 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[210a 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[210b 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[210c 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[210d 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[210e 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[210f 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2110 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2111 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2112 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2113 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2114 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2115 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e d2 05 06 7e 70 b8 58 7e 0a 2f 1c a3 1e 3b 05 |n...~p.X~./...;.|
00000010 0c 49 ca 58 ce d8 2b 75 7c 10 57 07 a4 60 c8 85 |.I.X..+u|.W..`..|
[2116 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be 8d 93 3b 54 81 82 44 f9 02 05 |0E.!....;T..D...|
00000010 78 36 37 68 ac 72 ec 4f 90 29 f7 0b 97 aa b3 f7 |x67h.r.O.)......|
00000020 3a ea 6b c9 7f 02 20 65 96 19 8e 4b 7f d0 2b 6a |:.k... e...K..+j|
00000030 46 dc 19 da c1 5f dd 75 cb a2 b6 75 c3 62 49 fd |F...._.u...u.bI.|
00000040 11 05 07 85 29 26 24 |....)&$|
[2117 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2118 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062e5c20 gate 1582330464499408000 evaluation starts
[2119 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062e5c20 signed by 0 principal evaluation starts (used [false])
[211a 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062e5c20 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[211b 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062e5c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[211c 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062e5c20 principal evaluation fails
[211d 02-22 00:14:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062e5c20 gate 1582330464499408000 evaluation fails
[211e 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[211f 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2120 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2121 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e d2 05 06 7e 70 b8 58 7e 0a 2f 1c a3 1e 3b 05 |n...~p.X~./...;.|
00000010 0c 49 ca 58 ce d8 2b 75 7c 10 57 07 a4 60 c8 85 |.I.X..+u|.W..`..|
[2122 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be 8d 93 3b 54 81 82 44 f9 02 05 |0E.!....;T..D...|
00000010 78 36 37 68 ac 72 ec 4f 90 29 f7 0b 97 aa b3 f7 |x67h.r.O.)......|
00000020 3a ea 6b c9 7f 02 20 65 96 19 8e 4b 7f d0 2b 6a |:.k... e...K..+j|
00000030 46 dc 19 da c1 5f dd 75 cb a2 b6 75 c3 62 49 fd |F...._.u...u.bI.|
00000040 11 05 07 85 29 26 24 |....)&$|
[2123 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2124 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630c520 gate 1582330464500818600 evaluation starts
[2125 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630c520 signed by 0 principal evaluation starts (used [false])
[2126 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630c520 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2127 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630c520 principal evaluation succeeds for identity 0
[2128 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630c520 gate 1582330464500818600 evaluation succeeds
[2129 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[212a 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[212b 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[212c 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[212d 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[212e 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes]}
[212f 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:33
[2130 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:33
[2131 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[2132 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2133 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2134 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2135 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2136 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2137 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2138 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[2139 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[213a 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[213b 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[213c 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[213d 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[213e 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[213f 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2140 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[2141 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2142 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[2143 02-22 00:14:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2144 02-22 00:14:24.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2145 02-22 00:14:24.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2146 02-22 00:14:24.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[2147 02-22 00:14:24.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2148 02-22 00:14:24.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2149 02-22 00:14:24.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[214a 02-22 00:14:24.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[214b 02-22 00:14:24.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[214c 02-22 00:14:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes
[214d 02-22 00:14:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[214e 02-22 00:14:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[214f 02-22 00:14:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2150 02-22 00:14:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes
[2151 02-22 00:14:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2152 02-22 00:14:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2153 02-22 00:14:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2154 02-22 00:14:24.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2155 02-22 00:14:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2156 02-22 00:14:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2157 02-22 00:14:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2158 02-22 00:14:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2159 02-22 00:14:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[215a 02-22 00:14:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[215b 02-22 00:14:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[215c 02-22 00:14:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[215d 02-22 00:14:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[215e 02-22 00:14:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[215f 02-22 00:14:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2160 02-22 00:14:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2161 02-22 00:14:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2162 02-22 00:14:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[2163 02-22 00:14:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[2164 02-22 00:14:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2165 02-22 00:14:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2166 02-22 00:14:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2167 02-22 00:14:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[2168 02-22 00:14:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[2169 02-22 00:14:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[216a 02-22 00:14:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:12344280769397483869 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[216b 02-22 00:14:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:12344280769397483869 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[216c 02-22 00:14:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[216d 02-22 00:14:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[216e 02-22 00:14:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[216f 02-22 00:14:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2170 02-22 00:14:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2171 02-22 00:14:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2172 02-22 00:14:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[2173 02-22 00:14:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2174 02-22 00:14:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[2175 02-22 00:14:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2176 02-22 00:14:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[2177 02-22 00:14:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2178 02-22 00:14:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 72 79 de d3 98 9d de 7d 13 8a d8 6f 81 cb 06 |.ry.....}...o...|
00000010 08 a4 63 6d 72 e2 ef e8 c1 e7 2d 02 52 e3 8b bc |..cmr.....-.R...|
[2179 02-22 00:14:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 10 de b7 04 95 76 2b 6e 50 d7 |0E.!.......v+nP.|
00000010 4c 8f 68 f1 0f b8 60 ea 1b aa 36 51 df 71 67 c4 |L.h...`...6Q.qg.|
00000020 c6 b4 a2 8e 8e 02 20 35 84 24 17 e3 47 b2 95 14 |...... 5.$..G...|
00000030 52 84 a4 f9 22 1b 65 fa 56 a3 76 df ff d8 b1 f9 |R...".e.V.v.....|
00000040 a8 15 65 59 7f 55 78 |..eY.Ux|
[217a 02-22 00:14:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[217b 02-22 00:14:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 6f a7 a8 d5 ce 7b e1 f3 e8 df fa |0D. 1o....{.....|
00000010 80 51 3f 40 5b 15 6e ee d8 fc 35 ba 8a de ee 4c |.Q?@[.n...5....L|
00000020 1d b1 32 aa 02 20 33 3c a8 29 80 21 88 b2 e4 c5 |..2.. 3<.).!....|
00000030 63 0f 44 ba e6 1e 0a 23 ec 02 20 19 5e 7a 1e a8 |c.D....#.. .^z..|
00000040 8c 5b 53 1c a7 a7 |.[S...|
[217c 02-22 00:14:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[217d 02-22 00:14:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[217e 02-22 00:14:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:37
[217f 02-22 00:14:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:37
[2180 02-22 00:14:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[2181 02-22 00:14:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2182 02-22 00:14:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2183 02-22 00:14:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2184 02-22 00:14:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[2185 02-22 00:14:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2186 02-22 00:14:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2187 02-22 00:14:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[2188 02-22 00:14:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[2189 02-22 00:14:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[218a 02-22 00:14:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[218b 02-22 00:14:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:9015023068528805936 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[218c 02-22 00:14:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:9015023068528805936 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[218d 02-22 00:14:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[218e 02-22 00:14:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[218f 02-22 00:14:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2190 02-22 00:14:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2191 02-22 00:14:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2192 02-22 00:14:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[2193 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2194 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2195 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2196 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2197 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2198 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2199 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[219a 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 af 17 c4 d0 59 33 18 14 7e ee 2a 7f d8 ab eb |.....Y3..~.*....|
00000010 b5 53 70 a9 0e e2 c4 fc 1f 04 07 81 50 c3 d2 08 |.Sp.........P...|
[219b 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 64 02 01 a5 6f 37 de 68 bd 51 d3 |0D. kd...o7.h.Q.|
00000010 91 30 fa 9c 94 84 be 91 ad 19 b5 69 6a 31 37 48 |.0.........ij17H|
00000020 0a 2c 88 92 02 20 36 09 26 e7 43 47 58 08 c2 da |.,... 6.&.CGX...|
00000030 69 32 93 e9 e7 94 50 e9 67 a3 93 16 24 dd 9f 5a |i2....P.g...$..Z|
00000040 8b 68 68 c2 f8 14 |.hh...|
[219c 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[219d 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006377130 gate 1582330466354252900 evaluation starts
[219e 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006377130 signed by 0 principal evaluation starts (used [false])
[219f 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006377130 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[21a0 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006377130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[21a1 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006377130 principal evaluation fails
[21a2 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006377130 gate 1582330466354252900 evaluation fails
[21a3 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[21a4 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[21a5 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[21a6 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 af 17 c4 d0 59 33 18 14 7e ee 2a 7f d8 ab eb |.....Y3..~.*....|
00000010 b5 53 70 a9 0e e2 c4 fc 1f 04 07 81 50 c3 d2 08 |.Sp.........P...|
[21a7 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 64 02 01 a5 6f 37 de 68 bd 51 d3 |0D. kd...o7.h.Q.|
00000010 91 30 fa 9c 94 84 be 91 ad 19 b5 69 6a 31 37 48 |.0.........ij17H|
00000020 0a 2c 88 92 02 20 36 09 26 e7 43 47 58 08 c2 da |.,... 6.&.CGX...|
00000030 69 32 93 e9 e7 94 50 e9 67 a3 93 16 24 dd 9f 5a |i2....P.g...$..Z|
00000040 8b 68 68 c2 f8 14 |.hh...|
[21a8 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[21a9 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006377a30 gate 1582330466357642300 evaluation starts
[21aa 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006377a30 signed by 0 principal evaluation starts (used [false])
[21ab 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006377a30 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[21ac 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006377a30 principal evaluation succeeds for identity 0
[21ad 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006377a30 gate 1582330466357642300 evaluation succeeds
[21ae 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[21af 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[21b0 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[21b1 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[21b2 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes
[21b3 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes]}
[21b4 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:34
[21b5 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:34
[21b6 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[21b7 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21b8 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21b9 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21ba 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[21bb 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21bc 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21bd 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21be 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[21bf 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[21c0 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[21c1 02-22 00:14:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21c2 02-22 00:14:26.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[21c3 02-22 00:14:26.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:15812576258905188792 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[21c4 02-22 00:14:26.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[21c5 02-22 00:14:26.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:3949480921323718537 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[21c6 02-22 00:14:26.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[21c8 02-22 00:14:26.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:15812576258905188792 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[21c7 02-22 00:14:26.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1147905650761530835 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[21c9 02-22 00:14:26.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21ca 02-22 00:14:26.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1147905650761530835 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[21cb 02-22 00:14:26.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:3949480921323718537 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[21cd 02-22 00:14:26.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21cc 02-22 00:14:26.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21ce 02-22 00:14:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3949480921323718537 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[21cf 02-22 00:14:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:12737708149950864092 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[21d0 02-22 00:14:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3949480921323718537 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[21d1 02-22 00:14:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3949480921323718537 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[21d2 02-22 00:14:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21d3 02-22 00:14:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:12737708149950864092 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[21d4 02-22 00:14:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:12737708149950864092 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[21d5 02-22 00:14:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21d6 02-22 00:14:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21d7 02-22 00:14:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21d8 02-22 00:14:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21d9 02-22 00:14:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21da 02-22 00:14:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21db 02-22 00:14:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[21dc 02-22 00:14:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21dd 02-22 00:14:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1147905650761530835 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[21de 02-22 00:14:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1147905650761530835 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[21df 02-22 00:14:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21e0 02-22 00:14:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15812576258905188792 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[21e1 02-22 00:14:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15812576258905188792 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[21e2 02-22 00:14:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21e3 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[21e4 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[21e5 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[21e6 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[21e7 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[21e8 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[21e9 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[21ea 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[21eb 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[21ec 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[21ed 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[21ee 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[21ef 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 f9 98 16 6b ba b3 ad da fe 76 0a f8 f9 7f d3 |....k.....v.....|
00000010 5e c7 11 bf 83 a7 4f b0 3c c5 2b 87 c8 4c 31 ab |^.....O.<.+..L1.|
[21f0 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 16 4e d0 2a aa df d2 d2 9e fc |0E.!...N.*......|
00000010 ef fe 7f 42 ea eb 48 7f 96 cd 29 2d a2 90 a6 ec |...B..H...)-....|
00000020 9d 8d 4b 24 e8 02 20 56 3c df 82 5e 7c 57 32 35 |..K$.. V<..^|W25|
00000030 5c 6d ac 98 9f a4 d4 b5 6a dd 74 72 8f cf 66 90 |\m......j.tr..f.|
00000040 77 93 22 6f 0d d9 c7 |w."o...|
[21f1 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[21f2 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063b2f40 gate 1582330466427210700 evaluation starts
[21f3 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063b2f40 signed by 0 principal evaluation starts (used [false])
[21f4 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063b2f40 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[21f5 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063b2f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[21f6 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063b2f40 principal evaluation fails
[21f7 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063b2f40 gate 1582330466427210700 evaluation fails
[21f8 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[21f9 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[21fa 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[21fb 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 f9 98 16 6b ba b3 ad da fe 76 0a f8 f9 7f d3 |....k.....v.....|
00000010 5e c7 11 bf 83 a7 4f b0 3c c5 2b 87 c8 4c 31 ab |^.....O.<.+..L1.|
[21fc 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 16 4e d0 2a aa df d2 d2 9e fc |0E.!...N.*......|
00000010 ef fe 7f 42 ea eb 48 7f 96 cd 29 2d a2 90 a6 ec |...B..H...)-....|
00000020 9d 8d 4b 24 e8 02 20 56 3c df 82 5e 7c 57 32 35 |..K$.. V<..^|W25|
00000030 5c 6d ac 98 9f a4 d4 b5 6a dd 74 72 8f cf 66 90 |\m......j.tr..f.|
00000040 77 93 22 6f 0d d9 c7 |w."o...|
[21fd 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[21fe 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063b3840 gate 1582330466428674600 evaluation starts
[21ff 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063b3840 signed by 0 principal evaluation starts (used [false])
[2200 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063b3840 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2201 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063b3840 principal evaluation succeeds for identity 0
[2202 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063b3840 gate 1582330466428674600 evaluation succeeds
[2203 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2204 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2205 02-22 00:14:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2206 02-22 00:14:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2207 02-22 00:14:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes
[2208 02-22 00:14:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes]}
[2209 02-22 00:14:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:36
[220a 02-22 00:14:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:36
[220b 02-22 00:14:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[220c 02-22 00:14:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[220d 02-22 00:14:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[220e 02-22 00:14:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[220f 02-22 00:14:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2210 02-22 00:14:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2211 02-22 00:14:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2212 02-22 00:14:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[2213 02-22 00:14:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[2214 02-22 00:14:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[2215 02-22 00:14:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2216 02-22 00:14:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2217 02-22 00:14:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151021
[2218 02-22 00:14:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 45A0830E228F1A4803528A47F10DF7BF2ABDF739A87E6D0322E62DB3AE453701
[2219 02-22 00:14:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[221a 02-22 00:14:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[221b 02-22 00:14:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[221c 02-22 00:14:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[221d 02-22 00:14:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[221e 02-22 00:14:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[221f 02-22 00:14:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[2220 02-22 00:14:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[2222 02-22 00:14:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2223 02-22 00:14:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2224 02-22 00:14:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2225 02-22 00:14:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2221 02-22 00:14:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2226 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[2227 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[2228 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2229 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[222a 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[222b 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[222c 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[222d 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[222e 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[222f 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2230 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2231 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2232 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 af 17 c4 d0 59 33 18 14 7e ee 2a 7f d8 ab eb |.....Y3..~.*....|
00000010 b5 53 70 a9 0e e2 c4 fc 1f 04 07 81 50 c3 d2 08 |.Sp.........P...|
[2233 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 64 02 01 a5 6f 37 de 68 bd 51 d3 |0D. kd...o7.h.Q.|
00000010 91 30 fa 9c 94 84 be 91 ad 19 b5 69 6a 31 37 48 |.0.........ij17H|
00000020 0a 2c 88 92 02 20 36 09 26 e7 43 47 58 08 c2 da |.,... 6.&.CGX...|
00000030 69 32 93 e9 e7 94 50 e9 67 a3 93 16 24 dd 9f 5a |i2....P.g...$..Z|
00000040 8b 68 68 c2 f8 14 |.hh...|
[2234 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2235 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063f43e0 gate 1582330466496217800 evaluation starts
[2236 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063f43e0 signed by 0 principal evaluation starts (used [false])
[2237 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063f43e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2238 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063f43e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2239 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063f43e0 principal evaluation fails
[223a 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063f43e0 gate 1582330466496217800 evaluation fails
[223b 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[223c 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[223d 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[223e 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 af 17 c4 d0 59 33 18 14 7e ee 2a 7f d8 ab eb |.....Y3..~.*....|
00000010 b5 53 70 a9 0e e2 c4 fc 1f 04 07 81 50 c3 d2 08 |.Sp.........P...|
[223f 02-22 00:14:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 64 02 01 a5 6f 37 de 68 bd 51 d3 |0D. kd...o7.h.Q.|
00000010 91 30 fa 9c 94 84 be 91 ad 19 b5 69 6a 31 37 48 |.0.........ij17H|
00000020 0a 2c 88 92 02 20 36 09 26 e7 43 47 58 08 c2 da |.,... 6.&.CGX...|
00000030 69 32 93 e9 e7 94 50 e9 67 a3 93 16 24 dd 9f 5a |i2....P.g...$..Z|
00000040 8b 68 68 c2 f8 14 |.hh...|
[2240 02-22 00:14:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2241 02-22 00:14:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063f4ce0 gate 1582330466500608500 evaluation starts
[2242 02-22 00:14:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063f4ce0 signed by 0 principal evaluation starts (used [false])
[2243 02-22 00:14:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063f4ce0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2244 02-22 00:14:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063f4ce0 principal evaluation succeeds for identity 0
[2245 02-22 00:14:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0063f4ce0 gate 1582330466500608500 evaluation succeeds
[2246 02-22 00:14:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2247 02-22 00:14:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2248 02-22 00:14:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2249 02-22 00:14:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[224a 02-22 00:14:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes
[224b 02-22 00:14:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[224c 02-22 00:14:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[224d 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 a0 83 0e 22 8f 1a 48 03 52 8a 47 f1 0d f7 bf |E..."..H.R.G....|
00000010 2a bd f7 39 a8 7e 6d 03 22 e6 2d b3 ae 45 37 01 |*..9.~m.".-..E7.|
[224e 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 02 e4 97 15 f0 bd 7c 01 51 4d |0E.!........|.QM|
00000010 4a a9 28 16 50 2f 61 7d 34 c4 69 b1 01 b6 9a 03 |J.(.P/a}4.i.....|
00000020 9a 3d cc 8b 4b 02 20 56 61 60 4b 2b 70 c6 36 35 |.=..K. Va`K+p.65|
00000030 2e ac a5 62 1e a3 81 d5 e4 d6 b9 ba 20 7e a5 7d |...b........ ~.}|
00000040 79 fa 52 6f 41 f5 80 |y.RoA..|
[224f 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[2250 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[2251 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2252 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2253 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 72 79 de d3 98 9d de 7d 13 8a d8 6f 81 cb 06 |.ry.....}...o...|
00000010 08 a4 63 6d 72 e2 ef e8 c1 e7 2d 02 52 e3 8b bc |..cmr.....-.R...|
[2254 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 10 de b7 04 95 76 2b 6e 50 d7 |0E.!.......v+nP.|
00000010 4c 8f 68 f1 0f b8 60 ea 1b aa 36 51 df 71 67 c4 |L.h...`...6Q.qg.|
00000020 c6 b4 a2 8e 8e 02 20 35 84 24 17 e3 47 b2 95 14 |...... 5.$..G...|
00000030 52 84 a4 f9 22 1b 65 fa 56 a3 76 df ff d8 b1 f9 |R...".e.V.v.....|
00000040 a8 15 65 59 7f 55 78 |..eY.Ux|
[2255 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes
[2256 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[2257 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2258 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2259 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[225a 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[225b 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[225c 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 a0 83 0e 22 8f 1a 48 03 52 8a 47 f1 0d f7 bf |E..."..H.R.G....|
00000010 2a bd f7 39 a8 7e 6d 03 22 e6 2d b3 ae 45 37 01 |*..9.~m.".-..E7.|
[225d 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 02 e4 97 15 f0 bd 7c 01 51 4d |0E.!........|.QM|
00000010 4a a9 28 16 50 2f 61 7d 34 c4 69 b1 01 b6 9a 03 |J.(.P/a}4.i.....|
00000020 9a 3d cc 8b 4b 02 20 56 61 60 4b 2b 70 c6 36 35 |.=..K. Va`K+p.65|
00000030 2e ac a5 62 1e a3 81 d5 e4 d6 b9 ba 20 7e a5 7d |...b........ ~.}|
00000040 79 fa 52 6f 41 f5 80 |y.RoA..|
[225e 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[225f 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes
[2260 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2261 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2262 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 72 79 de d3 98 9d de 7d 13 8a d8 6f 81 cb 06 |.ry.....}...o...|
00000010 08 a4 63 6d 72 e2 ef e8 c1 e7 2d 02 52 e3 8b bc |..cmr.....-.R...|
[2263 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 10 de b7 04 95 76 2b 6e 50 d7 |0E.!.......v+nP.|
00000010 4c 8f 68 f1 0f b8 60 ea 1b aa 36 51 df 71 67 c4 |L.h...`...6Q.qg.|
00000020 c6 b4 a2 8e 8e 02 20 35 84 24 17 e3 47 b2 95 14 |...... 5.$..G...|
00000030 52 84 a4 f9 22 1b 65 fa 56 a3 76 df ff d8 b1 f9 |R...".e.V.v.....|
00000040 a8 15 65 59 7f 55 78 |..eY.Ux|
[2264 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes
[2265 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2266 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[2267 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2268 02-22 00:14:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2269 02-22 00:14:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[226a 02-22 00:14:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[226c 02-22 00:14:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[226b 02-22 00:14:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[226d 02-22 00:14:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[226e 02-22 00:14:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[226f 02-22 00:14:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 f9 98 16 6b ba b3 ad da fe 76 0a f8 f9 7f d3 |....k.....v.....|
00000010 5e c7 11 bf 83 a7 4f b0 3c c5 2b 87 c8 4c 31 ab |^.....O.<.+..L1.|
[2270 02-22 00:14:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 16 4e d0 2a aa df d2 d2 9e fc |0E.!...N.*......|
00000010 ef fe 7f 42 ea eb 48 7f 96 cd 29 2d a2 90 a6 ec |...B..H...)-....|
00000020 9d 8d 4b 24 e8 02 20 56 3c df 82 5e 7c 57 32 35 |..K$.. V<..^|W25|
00000030 5c 6d ac 98 9f a4 d4 b5 6a dd 74 72 8f cf 66 90 |\m......j.tr..f.|
00000040 77 93 22 6f 0d d9 c7 |w."o...|
[2271 02-22 00:14:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2272 02-22 00:14:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064158c0 gate 1582330466525457200 evaluation starts
[2273 02-22 00:14:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064158c0 signed by 0 principal evaluation starts (used [false])
[2274 02-22 00:14:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064158c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2275 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064158c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2276 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064158c0 principal evaluation fails
[2277 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064158c0 gate 1582330466525457200 evaluation fails
[2278 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2279 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[227a 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[227b 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 f9 98 16 6b ba b3 ad da fe 76 0a f8 f9 7f d3 |....k.....v.....|
00000010 5e c7 11 bf 83 a7 4f b0 3c c5 2b 87 c8 4c 31 ab |^.....O.<.+..L1.|
[227c 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 16 4e d0 2a aa df d2 d2 9e fc |0E.!...N.*......|
00000010 ef fe 7f 42 ea eb 48 7f 96 cd 29 2d a2 90 a6 ec |...B..H...)-....|
00000020 9d 8d 4b 24 e8 02 20 56 3c df 82 5e 7c 57 32 35 |..K$.. V<..^|W25|
00000030 5c 6d ac 98 9f a4 d4 b5 6a dd 74 72 8f cf 66 90 |\m......j.tr..f.|
00000040 77 93 22 6f 0d d9 c7 |w."o...|
[227d 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[227e 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00642c1c0 gate 1582330466532474400 evaluation starts
[227f 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00642c1c0 signed by 0 principal evaluation starts (used [false])
[2280 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00642c1c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2281 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00642c1c0 principal evaluation succeeds for identity 0
[2282 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00642c1c0 gate 1582330466532474400 evaluation succeeds
[2283 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2284 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2285 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2286 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2287 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes
[2288 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2289 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[228a 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[228b 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[228c 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 a0 83 0e 22 8f 1a 48 03 52 8a 47 f1 0d f7 bf |E..."..H.R.G....|
00000010 2a bd f7 39 a8 7e 6d 03 22 e6 2d b3 ae 45 37 01 |*..9.~m.".-..E7.|
[228d 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 02 e4 97 15 f0 bd 7c 01 51 4d |0E.!........|.QM|
00000010 4a a9 28 16 50 2f 61 7d 34 c4 69 b1 01 b6 9a 03 |J.(.P/a}4.i.....|
00000020 9a 3d cc 8b 4b 02 20 56 61 60 4b 2b 70 c6 36 35 |.=..K. Va`K+p.65|
00000030 2e ac a5 62 1e a3 81 d5 e4 d6 b9 ba 20 7e a5 7d |...b........ ~.}|
00000040 79 fa 52 6f 41 f5 80 |y.RoA..|
[228e 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[228f 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 c9 94 0c 0f 34 b5 bc 79 a2 15 |0E.!......4..y..|
00000010 2e 18 f5 2d fa de c3 20 ef 49 1d f7 b1 fb 0f 50 |...-... .I.....P|
00000020 3b ec f9 9b d7 02 20 02 81 cc f3 0d 64 9e b0 66 |;..... .....d..f|
00000030 2f ce 7d 44 26 06 af 33 b9 c0 40 10 b4 90 bd 2f |/.}D&..3..@..../|
00000040 a7 a1 55 94 5e 3a 20 |..U.^: |
[2290 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2291 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2293 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2294 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2292 02-22 00:14:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2295 02-22 00:14:27.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2296 02-22 00:14:27.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2297 02-22 00:14:27.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[2298 02-22 00:14:27.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[229a 02-22 00:14:27.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2299 02-22 00:14:27.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[229c 02-22 00:14:27.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[229b 02-22 00:14:27.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[229d 02-22 00:14:27.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[229e 02-22 00:14:27.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[229f 02-22 00:14:27.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[22a0 02-22 00:14:27.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[22a1 02-22 00:14:27.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[22a2 02-22 00:14:27.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[22a3 02-22 00:14:27.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22a4 02-22 00:14:27.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22a5 02-22 00:14:27.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[22a6 02-22 00:14:27.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[22a7 02-22 00:14:27.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[22a8 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[22a9 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[22aa 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[22ab 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[22ac 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[22ad 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[22ae 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[22af 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00645d3c0 gate 1582330467121320600 evaluation starts
[22b0 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00645d3c0 signed by 0 principal evaluation starts (used [false])
[22b1 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00645d3c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[22b2 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00645d3c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[22b3 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00645d3c0 principal evaluation fails
[22b4 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00645d3c0 gate 1582330467121320600 evaluation fails
[22b5 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[22b6 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[22b7 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[22b8 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[22b9 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[22ba 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[22bb 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00645dcc0 gate 1582330467124476900 evaluation starts
[22bc 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00645dcc0 signed by 0 principal evaluation starts (used [false])
[22bd 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00645dcc0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[22be 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00645dcc0 principal evaluation succeeds for identity 0
[22bf 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00645dcc0 gate 1582330467124476900 evaluation succeeds
[22c0 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[22c1 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[22c2 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[22c3 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[22c4 02-22 00:14:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22c5 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22c6 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[22c7 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[22c8 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[22c9 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[22ca 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[22cb 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[22cc 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[22cd 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[22ce 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[22cf 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006475720 gate 1582330467132075100 evaluation starts
[22d0 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006475720 signed by 0 principal evaluation starts (used [false])
[22d1 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006475720 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[22d2 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006475720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[22d3 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006475720 principal evaluation fails
[22d4 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006475720 gate 1582330467132075100 evaluation fails
[22d5 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[22d6 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[22d7 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[22d8 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[22d9 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[22da 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[22db 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006486020 gate 1582330467134301000 evaluation starts
[22dc 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006486020 signed by 0 principal evaluation starts (used [false])
[22dd 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006486020 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[22de 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006486020 principal evaluation succeeds for identity 0
[22df 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006486020 gate 1582330467134301000 evaluation succeeds
[22e0 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[22e1 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[22e2 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[22e3 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[22e4 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[22e5 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[22e6 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22e7 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22e8 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[22e9 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[22ea 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[22eb 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[22ec 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[22ed 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[22ee 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[22ef 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[22f0 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[22f1 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[22f2 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006487d30 gate 1582330467138090000 evaluation starts
[22f3 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006487d30 signed by 0 principal evaluation starts (used [false])
[22f4 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006487d30 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[22f5 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006487d30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[22f6 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006487d30 principal evaluation fails
[22f7 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006487d30 gate 1582330467138090000 evaluation fails
[22f8 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[22f9 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[22fa 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[22fb 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[22fc 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[22fd 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[22fe 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00649e630 gate 1582330467139231000 evaluation starts
[22ff 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00649e630 signed by 0 principal evaluation starts (used [false])
[2300 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00649e630 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2301 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00649e630 principal evaluation succeeds for identity 0
[2302 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00649e630 gate 1582330467139231000 evaluation succeeds
[2303 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2304 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2305 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2306 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2307 02-22 00:14:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[2308 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[2309 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[230a 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[230b 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[230c 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[230d 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[230e 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[230f 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2310 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2311 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2312 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2313 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2314 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064b4740 gate 1582330467144798400 evaluation starts
[2315 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064b4740 signed by 0 principal evaluation starts (used [false])
[2316 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064b4740 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2317 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064b4740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2318 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064b4740 principal evaluation fails
[2319 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064b4740 gate 1582330467144798400 evaluation fails
[231a 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[231b 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[231c 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[231d 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[231e 02-22 00:14:27.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[231f 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2320 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064b5040 gate 1582330467150791300 evaluation starts
[2321 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064b5040 signed by 0 principal evaluation starts (used [false])
[2322 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064b5040 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2323 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064b5040 principal evaluation succeeds for identity 0
[2324 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064b5040 gate 1582330467150791300 evaluation succeeds
[2325 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2326 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2327 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2328 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2329 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[232a 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[232b 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[232c 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[232d 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[232e 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[232f 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2330 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2331 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2332 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2333 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2334 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2335 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2336 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2337 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2338 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2339 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064cd410 gate 1582330467158653700 evaluation starts
[233a 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064cd410 signed by 0 principal evaluation starts (used [false])
[233b 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064cd410 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[233c 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064cd410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[233d 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064cd410 principal evaluation fails
[233e 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064cd410 gate 1582330467158653700 evaluation fails
[233f 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2340 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2341 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2342 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2343 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2344 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2345 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064cdd10 gate 1582330467163502100 evaluation starts
[2346 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064cdd10 signed by 0 principal evaluation starts (used [false])
[2347 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064cdd10 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2348 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064cdd10 principal evaluation succeeds for identity 0
[2349 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064cdd10 gate 1582330467163502100 evaluation succeeds
[234a 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[234b 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[234c 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[234d 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[234e 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[234f 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[2350 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[2351 02-22 00:14:27.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[2352 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2353 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2354 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2355 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2356 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2357 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2358 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2359 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[235a 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[235b 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[235c 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[235d 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006440320 gate 1582330467174200900 evaluation starts
[235e 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006440320 signed by 0 principal evaluation starts (used [false])
[235f 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006440320 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2361 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006440320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2362 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006440320 principal evaluation fails
[2363 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006440320 gate 1582330467174200900 evaluation fails
[2364 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2365 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2366 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2367 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[2368 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2369 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[236a 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006440d80 gate 1582330467177110200 evaluation starts
[236b 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006440d80 signed by 0 principal evaluation starts (used [false])
[236c 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006440d80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[236d 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006440d80 principal evaluation succeeds for identity 0
[236e 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc006440d80 gate 1582330467177110200 evaluation succeeds
[236f 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2370 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2371 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2372 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2373 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2360 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2374 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2375 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[2376 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2377 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2378 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16620205418625725100 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[2379 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16620205418625725100 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[237a 02-22 00:14:27.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[237b 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16620205418625725100 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[237c 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16620205418625725100 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[237d 02-22 00:14:27.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[237e 02-22 00:14:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[237f 02-22 00:14:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2380 02-22 00:14:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2381 02-22 00:14:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2382 02-22 00:14:27.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:431377386685021105 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[2383 02-22 00:14:27.73 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:431377386685021105 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[2384 02-22 00:14:27.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[2385 02-22 00:14:27.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2386 02-22 00:14:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[2387 02-22 00:14:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2388 02-22 00:14:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2389 02-22 00:14:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[238a 02-22 00:14:27.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[238b 02-22 00:14:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[238c 02-22 00:14:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[238d 02-22 00:14:28.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[238e 02-22 00:14:28.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[238f 02-22 00:14:28.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2390 02-22 00:14:28.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2391 02-22 00:14:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2392 02-22 00:14:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2393 02-22 00:14:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2394 02-22 00:14:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2395 02-22 00:14:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 13 60 5a 61 a6 a6 21 06 b4 9e 43 d5 60 12 40 |%.`Za..!...C.`.@|
00000010 33 ec 55 1f 9e 24 42 ff 1d ab fc 37 cb 5c e7 3b |3.U..$B....7.\.;|
[2396 02-22 00:14:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 66 d1 e9 fc 5c 76 d3 5c ec ef |0E.!..f...\v.\..|
00000010 d7 c0 9f 33 db 89 be a4 ee 21 6b fa 9f f2 cf 75 |...3.....!k....u|
00000020 62 ce 0f 85 5c 02 20 56 8d 84 65 50 01 1f 0a b2 |b...\. V..eP....|
00000030 ae 68 4a 9a 4e 7e a8 d4 7e be 20 05 06 40 cd 37 |.hJ.N~..~. ..@.7|
00000040 fb 84 5d 13 41 5d 5d |..].A]]|
[2397 02-22 00:14:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[2398 02-22 00:14:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 8e da bc a7 75 56 9d bc ce c9 |0E.!......uV....|
00000010 76 13 94 55 c4 0d 7e 41 68 aa 0d 57 1f 0a e6 f7 |v..U..~Ah..W....|
00000020 75 cf e4 4b 2b 02 20 7a 5e 0f 09 a0 d3 e4 57 79 |u..K+. z^.....Wy|
00000030 75 71 a5 45 6d 7d 69 39 64 6b f4 a8 c7 8e 6b 54 |uq.Em}i9dk....kT|
00000040 c2 9f 8b fa 2b 57 85 |....+W.|
[2399 02-22 00:14:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[239a 02-22 00:14:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[239b 02-22 00:14:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:38
[239c 02-22 00:14:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:38
[239d 02-22 00:14:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[239e 02-22 00:14:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23a1 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23a2 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[239f 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[23a3 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23a4 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[23a5 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[23a0 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[23a6 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23a8 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[23a9 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[23aa 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[23ab 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[23a7 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[23ac 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[23ad 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[23ae 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[23af 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 f3 69 be 49 4a 4b db cc ee 61 92 6e ea d4 65 |I.i.IJK...a.n..e|
00000010 a1 ae 4c e0 77 d2 b8 8d 59 f7 0f aa bf b9 4b 2e |..L.w...Y.....K.|
[23b0 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 af 27 0d cd e2 6b d1 a3 fd d5 a1 |0D. Y.'...k.....|
00000010 ad 0f 48 2b 19 f0 90 63 3e 21 b9 bc 66 20 67 0e |..H+...c>!..f g.|
00000020 cd 4d 68 fc 02 20 1f 5a 3c 9d 74 80 e6 cb f5 dd |.Mh.. .Z<.t.....|
00000030 ef 64 18 d6 08 61 8e ec e3 b5 91 d2 fd 31 28 d0 |.d...a.......1(.|
00000040 e0 f7 4f 6f 82 cc |..Oo..|
[23b1 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[23b2 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3a100 gate 1582330469288507700 evaluation starts
[23b3 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3a100 signed by 0 principal evaluation starts (used [false])
[23b4 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3a100 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[23b5 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3a100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[23b6 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3a100 principal evaluation fails
[23b7 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3a100 gate 1582330469288507700 evaluation fails
[23b8 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[23b9 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[23ba 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[23bb 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 f3 69 be 49 4a 4b db cc ee 61 92 6e ea d4 65 |I.i.IJK...a.n..e|
00000010 a1 ae 4c e0 77 d2 b8 8d 59 f7 0f aa bf b9 4b 2e |..L.w...Y.....K.|
[23bc 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 af 27 0d cd e2 6b d1 a3 fd d5 a1 |0D. Y.'...k.....|
00000010 ad 0f 48 2b 19 f0 90 63 3e 21 b9 bc 66 20 67 0e |..H+...c>!..f g.|
00000020 cd 4d 68 fc 02 20 1f 5a 3c 9d 74 80 e6 cb f5 dd |.Mh.. .Z<.t.....|
00000030 ef 64 18 d6 08 61 8e ec e3 b5 91 d2 fd 31 28 d0 |.d...a.......1(.|
00000040 e0 f7 4f 6f 82 cc |..Oo..|
[23bd 02-22 00:14:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[23be 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3aa10 gate 1582330469290035400 evaluation starts
[23bf 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23c0 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3aa10 signed by 0 principal evaluation starts (used [false])
[23c1 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23c2 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3aa10 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[23c3 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3aa10 principal evaluation succeeds for identity 0
[23c4 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23c5 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3aa10 gate 1582330469290035400 evaluation succeeds
[23c6 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[23c7 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[23c8 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[23c9 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[23ca 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23cb 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[23cc 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[23cd 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[23ce 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes]}
[23cf 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:37
[23d0 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[23d1 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:37
[23d2 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23d3 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[23d4 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23d5 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23d6 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23d7 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[23d8 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[23d9 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23da 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23db 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23dc 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[23dd 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23de 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[23df 02-22 00:14:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23e0 02-22 00:14:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23e1 02-22 00:14:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23e2 02-22 00:14:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23e3 02-22 00:14:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23e4 02-22 00:14:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23e5 02-22 00:14:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23e6 02-22 00:14:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23e7 02-22 00:14:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[23e8 02-22 00:14:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23ea 02-22 00:14:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[23e9 02-22 00:14:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[23ec 02-22 00:14:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23eb 02-22 00:14:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[23ed 02-22 00:14:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[23ee 02-22 00:14:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23ef 02-22 00:14:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[23f0 02-22 00:14:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23f1 02-22 00:14:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[23f2 02-22 00:14:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[23f3 02-22 00:14:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23f4 02-22 00:14:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[23f6 02-22 00:14:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23f5 02-22 00:14:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23f7 02-22 00:14:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[23f8 02-22 00:14:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[23f9 02-22 00:14:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA15100A1801
[23fa 02-22 00:14:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 672CB11CAE4D1BE6C9A33FB0EA6AB809E5D069534980DC4DBEDE3C2D89044F23
[23fb 02-22 00:14:29.37 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[23fc 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[23fd 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[23fe 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[23ff 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[2400 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2401 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2402 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2403 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2404 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2405 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2406 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2407 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 24 f0 5c 65 5e a8 e0 7e 5e df 6a 9d 03 16 b6 |j$.\e^..~^.j....|
00000010 fd b0 05 92 f2 26 af 4e 52 c8 44 0e 6a 3c 81 d1 |.....&.NR.D.j<..|
[2408 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 49 5d 85 a8 04 83 16 f5 3d c0 ef |0D. LI]......=..|
00000010 95 73 10 81 a3 c6 fa 94 95 1f bc c0 e4 0a 55 3f |.s............U?|
00000020 69 95 5e 6f 02 20 19 5f 92 81 49 ac 96 6e c4 e2 |i.^o. ._..I..n..|
00000030 c3 e3 6e 1d 45 4b 63 11 ac 3c 84 dc b4 d0 33 2d |..n.EKc..<....3-|
00000040 3c 9d 17 d5 79 e3 |<...y.|
[2409 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[240a 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7cda0 gate 1582330469388262300 evaluation starts
[240b 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7cda0 signed by 0 principal evaluation starts (used [false])
[240c 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7cda0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[240d 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7cda0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[240e 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7cda0 principal evaluation fails
[240f 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7cda0 gate 1582330469388262300 evaluation fails
[2410 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2411 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2412 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2413 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 24 f0 5c 65 5e a8 e0 7e 5e df 6a 9d 03 16 b6 |j$.\e^..~^.j....|
00000010 fd b0 05 92 f2 26 af 4e 52 c8 44 0e 6a 3c 81 d1 |.....&.NR.D.j<..|
[2414 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 49 5d 85 a8 04 83 16 f5 3d c0 ef |0D. LI]......=..|
00000010 95 73 10 81 a3 c6 fa 94 95 1f bc c0 e4 0a 55 3f |.s............U?|
00000020 69 95 5e 6f 02 20 19 5f 92 81 49 ac 96 6e c4 e2 |i.^o. ._..I..n..|
00000030 c3 e3 6e 1d 45 4b 63 11 ac 3c 84 dc b4 d0 33 2d |..n.EKc..<....3-|
00000040 3c 9d 17 d5 79 e3 |<...y.|
[2415 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2416 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7d6b0 gate 1582330469388681600 evaluation starts
[2417 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7d6b0 signed by 0 principal evaluation starts (used [false])
[2418 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7d6b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2419 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7d6b0 principal evaluation succeeds for identity 0
[241a 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7d6b0 gate 1582330469388681600 evaluation succeeds
[241b 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[241c 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[241d 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[241e 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[241f 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2420 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes]}
[2421 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:35
[2422 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:35
[2423 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[2424 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2425 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2426 02-22 00:14:29.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2427 02-22 00:14:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[242a 02-22 00:14:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[242b 02-22 00:14:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[242c 02-22 00:14:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[242d 02-22 00:14:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[242e 02-22 00:14:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[242f 02-22 00:14:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2430 02-22 00:14:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2431 02-22 00:14:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2432 02-22 00:14:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2433 02-22 00:14:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2434 02-22 00:14:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2435 02-22 00:14:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2436 02-22 00:14:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2428 02-22 00:14:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2429 02-22 00:14:29.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2437 02-22 00:14:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[243b 02-22 00:14:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2438 02-22 00:14:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[243d 02-22 00:14:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2439 02-22 00:14:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[243e 02-22 00:14:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[243f 02-22 00:14:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[243a 02-22 00:14:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[243c 02-22 00:14:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2440 02-22 00:14:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2441 02-22 00:14:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2442 02-22 00:14:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2443 02-22 00:14:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2444 02-22 00:14:29.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2445 02-22 00:14:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151022
[2446 02-22 00:14:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D1506F30D4466BA17D0EE26F206FE1FC5153CA57351FAE7A13A5D91448781A5D
[2447 02-22 00:14:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[2448 02-22 00:14:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[2449 02-22 00:14:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[244a 02-22 00:14:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[244b 02-22 00:14:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[244c 02-22 00:14:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[244d 02-22 00:14:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[244e 02-22 00:14:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[244f 02-22 00:14:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2450 02-22 00:14:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[2451 02-22 00:14:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes
[2452 02-22 00:14:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2453 02-22 00:14:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes
[2454 02-22 00:14:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2455 02-22 00:14:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2456 02-22 00:14:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2457 02-22 00:14:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes
[2458 02-22 00:14:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes
[2459 02-22 00:14:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[245a 02-22 00:14:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes
[245b 02-22 00:14:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[245c 02-22 00:14:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d1 50 6f 30 d4 46 6b a1 7d 0e e2 6f 20 6f e1 fc |.Po0.Fk.}..o o..|
00000010 51 53 ca 57 35 1f ae 7a 13 a5 d9 14 48 78 1a 5d |QS.W5..z....Hx.]|
[245d 02-22 00:14:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 5b bd 5d ec e4 59 63 49 2e da |0E.!..[.]..YcI..|
00000010 94 9f e5 3c 43 8d 23 95 8f b9 eb 3d c3 40 30 a4 |...<C.#....=.@0.|
00000020 90 63 11 b9 23 02 20 30 fa 22 fc ab 9a 27 22 0f |.c..#. 0."...'".|
00000030 34 10 a3 b7 d9 82 37 59 72 53 d7 2a 1c be b3 99 |4.....7YrS.*....|
00000040 32 25 bf 56 31 41 79 |2%.V1Ay|
[245e 02-22 00:14:29.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes
[245f 02-22 00:14:29.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2460 02-22 00:14:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:12830214942060125342 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2461 02-22 00:14:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:12830214942060125342 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2462 02-22 00:14:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2463 02-22 00:14:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2464 02-22 00:14:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2465 02-22 00:14:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2466 02-22 00:14:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2467 02-22 00:14:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2468 02-22 00:14:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[2469 02-22 00:14:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[246a 02-22 00:14:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[246b 02-22 00:14:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[246c 02-22 00:14:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[246d 02-22 00:14:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[246e 02-22 00:14:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 c9 d8 88 47 3d 2e de e4 ba 3f 49 b5 31 26 3f |F...G=....?I.1&?|
00000010 0f 58 54 30 a8 d5 fd 5f d2 17 20 1e 1f 84 11 82 |.XT0..._.. .....|
[246f 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a e0 4e 22 c8 63 84 cb b9 b1 46 ef |0D. J.N".c....F.|
00000010 c2 79 71 f5 0e 9d 43 55 58 3a 56 08 87 85 cf cd |.yq...CUX:V.....|
00000020 97 d6 25 91 02 20 2e 0c af 47 a6 86 d0 8c 5d 30 |..%.. ...G....]0|
00000030 9f a8 5e bc 48 e1 30 ae 7e c7 2c 7e 9c a0 a3 ec |..^.H.0.~.,~....|
00000040 35 89 d2 8f c9 d4 |5.....|
[2470 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[2471 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 3d 50 39 9b 38 d2 f1 3c 75 66 |0E.!..=P9.8..<uf|
00000010 b2 9a 55 dc d3 81 26 be 5f 50 af 0a fb 8e cb 64 |..U...&._P.....d|
00000020 87 71 7e db 24 02 20 66 c5 6a b6 35 d8 95 ca c2 |.q~.$. f.j.5....|
00000030 6c f3 64 68 bd fb b2 ef 30 7b cc ff 49 03 85 2a |l.dh....0{..I..*|
00000040 b0 7b 6c 96 8d 70 7f |.{l..p.|
[2472 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2473 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[2474 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:39
[2475 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:39
[2476 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[2477 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2478 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2479 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[247a 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[247b 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[247c 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[247d 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[247e 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[247f 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[2480 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2481 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:10328984223839104383 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2482 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10328984223839104383 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2483 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[2484 02-22 00:14:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2485 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2486 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2487 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2488 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[2489 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[248a 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[248b 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[248c 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[248d 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[248e 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[248f 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2490 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 44 71 b6 6d a2 b1 94 8b ff a1 20 78 45 9b 75 |.Dq.m...... xE.u|
00000010 7a 77 43 6b 4c aa 0a ba 2d b8 99 29 f7 b4 6b 0a |zwCkL...-..)..k.|
[2491 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 37 36 af 17 5d df 0f d6 f0 bb |0E.!..76..].....|
00000010 ca 5c 7d 36 c5 2b dd 5a 99 f5 bb ae dd 93 df ce |.\}6.+.Z........|
00000020 c8 84 21 16 86 02 20 12 8f 8a e7 d4 0e b2 8a 41 |..!... ........A|
00000030 c4 79 8a 2f b2 4d 5b 96 17 dd 3c 0e 31 6b 5a ce |.y./.M[...<.1kZ.|
00000040 31 56 74 d2 c2 3f c0 |1Vt..?.|
[2492 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2493 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e60a0 gate 1582330470332666700 evaluation starts
[2494 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e60a0 signed by 0 principal evaluation starts (used [false])
[2495 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e60a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2496 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e60a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2497 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e60a0 principal evaluation fails
[2498 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e60a0 gate 1582330470332666700 evaluation fails
[2499 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[249a 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[249b 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[249c 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 44 71 b6 6d a2 b1 94 8b ff a1 20 78 45 9b 75 |.Dq.m...... xE.u|
00000010 7a 77 43 6b 4c aa 0a ba 2d b8 99 29 f7 b4 6b 0a |zwCkL...-..)..k.|
[249d 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 37 36 af 17 5d df 0f d6 f0 bb |0E.!..76..].....|
00000010 ca 5c 7d 36 c5 2b dd 5a 99 f5 bb ae dd 93 df ce |.\}6.+.Z........|
00000020 c8 84 21 16 86 02 20 12 8f 8a e7 d4 0e b2 8a 41 |..!... ........A|
00000030 c4 79 8a 2f b2 4d 5b 96 17 dd 3c 0e 31 6b 5a ce |.y./.M[...<.1kZ.|
00000040 31 56 74 d2 c2 3f c0 |1Vt..?.|
[249e 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[249f 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e69b0 gate 1582330470333306600 evaluation starts
[24a0 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e69b0 signed by 0 principal evaluation starts (used [false])
[24a1 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e69b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[24a2 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e69b0 principal evaluation succeeds for identity 0
[24a3 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e69b0 gate 1582330470333306600 evaluation succeeds
[24a4 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[24a5 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[24a6 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[24a7 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[24a8 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes
[24a9 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes]}
[24aa 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:36
[24ab 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:36
[24ac 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[24ad 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[24ae 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[24af 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[24b0 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[24b1 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[24b2 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[24b3 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[24b4 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[24b5 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[24b6 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[24b7 02-22 00:14:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[24b8 02-22 00:14:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[24b9 02-22 00:14:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:16121679306538821088 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[24ba 02-22 00:14:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[24bb 02-22 00:14:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:4026647658635183191 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[24bc 02-22 00:14:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[24bd 02-22 00:14:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:4535255088691888594 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[24be 02-22 00:14:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:4535255088691888594 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[24bf 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[24c0 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:16121679306538821088 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[24c1 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[24c2 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:4026647658635183191 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[24c3 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[24c4 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:5881254448194376433 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[24c5 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:5881254448194376433 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[24c6 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:5881254448194376433 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[24c7 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[24c8 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[24c9 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[24ca 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[24cb 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[24cc 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[24cd 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[24ce 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[24cf 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4026647658635183191 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[24d0 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4026647658635183191 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[24d1 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4026647658635183191 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[24d2 02-22 00:14:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[24d3 02-22 00:14:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4535255088691888594 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[24d4 02-22 00:14:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4535255088691888594 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[24d5 02-22 00:14:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[24d6 02-22 00:14:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16121679306538821088 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[24d7 02-22 00:14:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16121679306538821088 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[24d8 02-22 00:14:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[24d9 02-22 00:14:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[24da 02-22 00:14:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[24db 02-22 00:14:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[24dc 02-22 00:14:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[24dd 02-22 00:14:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[24de 02-22 00:14:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[24df 02-22 00:14:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[24e0 02-22 00:14:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[24e1 02-22 00:14:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[24e2 02-22 00:14:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[24e3 02-22 00:14:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[24e4 02-22 00:14:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[24e5 02-22 00:14:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 3f 77 49 b9 4f 78 20 52 7e 88 d2 de 9b 74 0a |.?wI.Ox R~....t.|
00000010 09 f7 74 ba 70 46 ab b6 a8 2b e2 20 8c 09 b0 44 |..t.pF...+. ...D|
[24e6 02-22 00:14:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 1d 34 2c 4a 9d 7e 41 eb 8e 2d 49 |0D. ..4,J.~A..-I|
00000010 37 b8 43 56 36 e3 01 64 f9 8a 7b d4 17 e3 24 c6 |7.CV6..d..{...$.|
00000020 45 83 77 f5 02 20 41 a8 33 a9 ae 8e 8d 72 3f b7 |E.w.. A.3....r?.|
00000030 d0 45 92 05 2f b0 4a ac 8c 3d 49 27 b1 6d 58 e4 |.E../.J..=I'.mX.|
00000040 0b 0e ba 5f b5 3c |..._.<|
[24e7 02-22 00:14:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[24e8 02-22 00:14:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bfa20 gate 1582330470400593500 evaluation starts
[24e9 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bfa20 signed by 0 principal evaluation starts (used [false])
[24ea 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bfa20 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[24eb 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bfa20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[24ec 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bfa20 principal evaluation fails
[24ed 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bfa20 gate 1582330470400593500 evaluation fails
[24ee 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[24ef 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[24f0 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[24f1 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 3f 77 49 b9 4f 78 20 52 7e 88 d2 de 9b 74 0a |.?wI.Ox R~....t.|
00000010 09 f7 74 ba 70 46 ab b6 a8 2b e2 20 8c 09 b0 44 |..t.pF...+. ...D|
[24f2 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 1d 34 2c 4a 9d 7e 41 eb 8e 2d 49 |0D. ..4,J.~A..-I|
00000010 37 b8 43 56 36 e3 01 64 f9 8a 7b d4 17 e3 24 c6 |7.CV6..d..{...$.|
00000020 45 83 77 f5 02 20 41 a8 33 a9 ae 8e 8d 72 3f b7 |E.w.. A.3....r?.|
00000030 d0 45 92 05 2f b0 4a ac 8c 3d 49 27 b1 6d 58 e4 |.E../.J..=I'.mX.|
00000040 0b 0e ba 5f b5 3c |..._.<|
[24f3 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[24f4 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397e3c0 gate 1582330470410833600 evaluation starts
[24f5 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397e3c0 signed by 0 principal evaluation starts (used [false])
[24f6 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397e3c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[24f7 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397e3c0 principal evaluation succeeds for identity 0
[24f8 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397e3c0 gate 1582330470410833600 evaluation succeeds
[24f9 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[24fa 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[24fb 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[24fc 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[24fd 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes
[24fe 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes]}
[24ff 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:38
[2500 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:38
[2501 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[2502 02-22 00:14:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2503 02-22 00:14:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2504 02-22 00:14:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2505 02-22 00:14:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[2506 02-22 00:14:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2507 02-22 00:14:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2508 02-22 00:14:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2509 02-22 00:14:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[250a 02-22 00:14:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[250b 02-22 00:14:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[250c 02-22 00:14:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[250d 02-22 00:14:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151023
[250e 02-22 00:14:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7DBE6443D7D122608937F421A6454CFE56BE55906152F62DB67C94A29B9AE21A
[250f 02-22 00:14:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[2510 02-22 00:14:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[2511 02-22 00:14:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2512 02-22 00:14:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[2513 02-22 00:14:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[2515 02-22 00:14:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2517 02-22 00:14:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[2518 02-22 00:14:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2514 02-22 00:14:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2516 02-22 00:14:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[2519 02-22 00:14:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[251a 02-22 00:14:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[251b 02-22 00:14:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[251c 02-22 00:14:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[251e 02-22 00:14:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2520 02-22 00:14:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[251d 02-22 00:14:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[251f 02-22 00:14:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[2521 02-22 00:14:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[2522 02-22 00:14:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d be 64 43 d7 d1 22 60 89 37 f4 21 a6 45 4c fe |}.dC.."`.7.!.EL.|
00000010 56 be 55 90 61 52 f6 2d b6 7c 94 a2 9b 9a e2 1a |V.U.aR.-.|......|
[2523 02-22 00:14:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 98 4b 35 2f ec ea 1f a2 f8 9c 8e |0D. ..K5/.......|
00000010 20 76 c1 9f cc 7e 6c 89 7d 90 6e 63 13 e2 9f ad | v...~l.}.nc....|
00000020 6c ed 6a 28 02 20 1c 22 89 79 f1 76 b2 18 88 bc |l.j(. .".y.v....|
00000030 89 81 03 2c 61 ee e4 71 b8 5f 34 5d ed da 33 a2 |...,a..q._4]..3.|
00000040 3f 62 ee 8c 39 57 |?b..9W|
[2524 02-22 00:14:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2525 02-22 00:14:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2526 02-22 00:14:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2527 02-22 00:14:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2528 02-22 00:14:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 c9 d8 88 47 3d 2e de e4 ba 3f 49 b5 31 26 3f |F...G=....?I.1&?|
00000010 0f 58 54 30 a8 d5 fd 5f d2 17 20 1e 1f 84 11 82 |.XT0..._.. .....|
[2529 02-22 00:14:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a e0 4e 22 c8 63 84 cb b9 b1 46 ef |0D. J.N".c....F.|
00000010 c2 79 71 f5 0e 9d 43 55 58 3a 56 08 87 85 cf cd |.yq...CUX:V.....|
00000020 97 d6 25 91 02 20 2e 0c af 47 a6 86 d0 8c 5d 30 |..%.. ...G....]0|
00000030 9f a8 5e bc 48 e1 30 ae 7e c7 2c 7e 9c a0 a3 ec |..^.H.0.~.,~....|
00000040 35 89 d2 8f c9 d4 |5.....|
[252a 02-22 00:14:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes
[252b 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[252c 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[252d 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[252e 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[252f 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2530 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2531 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2532 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2533 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2534 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 3f 77 49 b9 4f 78 20 52 7e 88 d2 de 9b 74 0a |.?wI.Ox R~....t.|
00000010 09 f7 74 ba 70 46 ab b6 a8 2b e2 20 8c 09 b0 44 |..t.pF...+. ...D|
[2535 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 1d 34 2c 4a 9d 7e 41 eb 8e 2d 49 |0D. ..4,J.~A..-I|
00000010 37 b8 43 56 36 e3 01 64 f9 8a 7b d4 17 e3 24 c6 |7.CV6..d..{...$.|
00000020 45 83 77 f5 02 20 41 a8 33 a9 ae 8e 8d 72 3f b7 |E.w.. A.3....r?.|
00000030 d0 45 92 05 2f b0 4a ac 8c 3d 49 27 b1 6d 58 e4 |.E../.J..=I'.mX.|
00000040 0b 0e ba 5f b5 3c |..._.<|
[2536 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2537 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d2c0 gate 1582330470471298800 evaluation starts
[2538 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d2c0 signed by 0 principal evaluation starts (used [false])
[2539 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d2c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[253a 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d2c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[253b 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d2c0 principal evaluation fails
[253c 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d2c0 gate 1582330470471298800 evaluation fails
[253d 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[253e 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[253f 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2540 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 3f 77 49 b9 4f 78 20 52 7e 88 d2 de 9b 74 0a |.?wI.Ox R~....t.|
00000010 09 f7 74 ba 70 46 ab b6 a8 2b e2 20 8c 09 b0 44 |..t.pF...+. ...D|
[2541 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 1d 34 2c 4a 9d 7e 41 eb 8e 2d 49 |0D. ..4,J.~A..-I|
00000010 37 b8 43 56 36 e3 01 64 f9 8a 7b d4 17 e3 24 c6 |7.CV6..d..{...$.|
00000020 45 83 77 f5 02 20 41 a8 33 a9 ae 8e 8d 72 3f b7 |E.w.. A.3....r?.|
00000030 d0 45 92 05 2f b0 4a ac 8c 3d 49 27 b1 6d 58 e4 |.E../.J..=I'.mX.|
00000040 0b 0e ba 5f b5 3c |..._.<|
[2542 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2543 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389dbc0 gate 1582330470471709400 evaluation starts
[2544 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389dbc0 signed by 0 principal evaluation starts (used [false])
[2545 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389dbc0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2546 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389dbc0 principal evaluation succeeds for identity 0
[2547 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389dbc0 gate 1582330470471709400 evaluation succeeds
[2548 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2549 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[254a 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[254b 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[254c 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes
[254d 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[254e 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[254f 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[2550 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[2551 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2552 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d be 64 43 d7 d1 22 60 89 37 f4 21 a6 45 4c fe |}.dC.."`.7.!.EL.|
00000010 56 be 55 90 61 52 f6 2d b6 7c 94 a2 9b 9a e2 1a |V.U.aR.-.|......|
[2553 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[2554 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 98 4b 35 2f ec ea 1f a2 f8 9c 8e |0D. ..K5/.......|
00000010 20 76 c1 9f cc 7e 6c 89 7d 90 6e 63 13 e2 9f ad | v...~l.}.nc....|
00000020 6c ed 6a 28 02 20 1c 22 89 79 f1 76 b2 18 88 bc |l.j(. .".y.v....|
00000030 89 81 03 2c 61 ee e4 71 b8 5f 34 5d ed da 33 a2 |...,a..q._4]..3.|
00000040 3f 62 ee 8c 39 57 |?b..9W|
[2555 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[2556 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 f2 89 1c 9d 34 d9 c3 b2 c0 13 |0E.!......4.....|
00000010 df ff 35 b6 57 67 40 b4 22 85 75 0e c3 d8 9a 44 |..5.Wg@.".u....D|
00000020 5c 1d bd 8c 9e 02 20 4c 3f 72 b7 b9 17 0b b7 ff |\..... L?r......|
00000030 8c a4 13 55 e4 9d 67 64 fc 2e f5 bf 1c 01 f7 6f |...U..gd.......o|
00000040 ae 83 45 8d bb ef d4 |..E....|
[2557 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2558 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2559 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[255a 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[255b 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[255c 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[255d 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[255e 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[255f 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2560 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2561 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2562 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2563 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2564 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2565 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 44 71 b6 6d a2 b1 94 8b ff a1 20 78 45 9b 75 |.Dq.m...... xE.u|
00000010 7a 77 43 6b 4c aa 0a ba 2d b8 99 29 f7 b4 6b 0a |zwCkL...-..)..k.|
[2566 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 37 36 af 17 5d df 0f d6 f0 bb |0E.!..76..].....|
00000010 ca 5c 7d 36 c5 2b dd 5a 99 f5 bb ae dd 93 df ce |.\}6.+.Z........|
00000020 c8 84 21 16 86 02 20 12 8f 8a e7 d4 0e b2 8a 41 |..!... ........A|
00000030 c4 79 8a 2f b2 4d 5b 96 17 dd 3c 0e 31 6b 5a ce |.y./.M[...<.1kZ.|
00000040 31 56 74 d2 c2 3f c0 |1Vt..?.|
[2567 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2568 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792ec0 gate 1582330470473210000 evaluation starts
[2569 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792ec0 signed by 0 principal evaluation starts (used [false])
[256a 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792ec0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[256b 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[256c 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792ec0 principal evaluation fails
[256d 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792ec0 gate 1582330470473210000 evaluation fails
[256e 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[256f 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2570 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2571 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 44 71 b6 6d a2 b1 94 8b ff a1 20 78 45 9b 75 |.Dq.m...... xE.u|
00000010 7a 77 43 6b 4c aa 0a ba 2d b8 99 29 f7 b4 6b 0a |zwCkL...-..)..k.|
[2572 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 37 36 af 17 5d df 0f d6 f0 bb |0E.!..76..].....|
00000010 ca 5c 7d 36 c5 2b dd 5a 99 f5 bb ae dd 93 df ce |.\}6.+.Z........|
00000020 c8 84 21 16 86 02 20 12 8f 8a e7 d4 0e b2 8a 41 |..!... ........A|
00000030 c4 79 8a 2f b2 4d 5b 96 17 dd 3c 0e 31 6b 5a ce |.y./.M[...<.1kZ.|
00000040 31 56 74 d2 c2 3f c0 |1Vt..?.|
[2573 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2574 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037937d0 gate 1582330470473609900 evaluation starts
[2575 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037937d0 signed by 0 principal evaluation starts (used [false])
[2576 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037937d0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2577 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037937d0 principal evaluation succeeds for identity 0
[2578 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037937d0 gate 1582330470473609900 evaluation succeeds
[2579 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[257a 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[257b 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[257c 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[257d 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes
[257e 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[257f 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[2580 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d be 64 43 d7 d1 22 60 89 37 f4 21 a6 45 4c fe |}.dC.."`.7.!.EL.|
00000010 56 be 55 90 61 52 f6 2d b6 7c 94 a2 9b 9a e2 1a |V.U.aR.-.|......|
[2581 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 98 4b 35 2f ec ea 1f a2 f8 9c 8e |0D. ..K5/.......|
00000010 20 76 c1 9f cc 7e 6c 89 7d 90 6e 63 13 e2 9f ad | v...~l.}.nc....|
00000020 6c ed 6a 28 02 20 1c 22 89 79 f1 76 b2 18 88 bc |l.j(. .".y.v....|
00000030 89 81 03 2c 61 ee e4 71 b8 5f 34 5d ed da 33 a2 |...,a..q._4]..3.|
00000040 3f 62 ee 8c 39 57 |?b..9W|
[2582 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2583 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes
[2584 02-22 00:14:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2585 02-22 00:14:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2586 02-22 00:14:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 c9 d8 88 47 3d 2e de e4 ba 3f 49 b5 31 26 3f |F...G=....?I.1&?|
00000010 0f 58 54 30 a8 d5 fd 5f d2 17 20 1e 1f 84 11 82 |.XT0..._.. .....|
[2587 02-22 00:14:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a e0 4e 22 c8 63 84 cb b9 b1 46 ef |0D. J.N".c....F.|
00000010 c2 79 71 f5 0e 9d 43 55 58 3a 56 08 87 85 cf cd |.yq...CUX:V.....|
00000020 97 d6 25 91 02 20 2e 0c af 47 a6 86 d0 8c 5d 30 |..%.. ...G....]0|
00000030 9f a8 5e bc 48 e1 30 ae 7e c7 2c 7e 9c a0 a3 ec |..^.H.0.~.,~....|
00000040 35 89 d2 8f c9 d4 |5.....|
[2588 02-22 00:14:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes
[2589 02-22 00:14:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[258a 02-22 00:14:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[258b 02-22 00:14:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[258c 02-22 00:14:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[258d 02-22 00:14:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[258f 02-22 00:14:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[2590 02-22 00:14:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2591 02-22 00:14:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[2592 02-22 00:14:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2593 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[2594 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2595 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2596 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2597 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2598 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2599 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[259a 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[259b 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[259c 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[259d 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[259e 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[259f 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[25a0 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728fb0 gate 1582330471088057200 evaluation starts
[25a1 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728fb0 signed by 0 principal evaluation starts (used [false])
[25a2 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728fb0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[25a3 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[25a4 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728fb0 principal evaluation fails
[25a5 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728fb0 gate 1582330471088057200 evaluation fails
[25a6 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[25a7 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[25a8 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[25a9 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[25aa 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[25ab 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[25ac 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037298b0 gate 1582330471088673400 evaluation starts
[25ad 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037298b0 signed by 0 principal evaluation starts (used [false])
[25ae 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037298b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[25af 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037298b0 principal evaluation succeeds for identity 0
[25b0 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037298b0 gate 1582330471088673400 evaluation succeeds
[25b1 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[25b2 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[25b3 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[25b4 02-22 00:14:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[258e 02-22 00:14:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[25b5 02-22 00:14:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25b6 02-22 00:14:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[25b7 02-22 00:14:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[25b8 02-22 00:14:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[25b9 02-22 00:14:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[25ba 02-22 00:14:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[25bb 02-22 00:14:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[25bc 02-22 00:14:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[25bd 02-22 00:14:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[25be 02-22 00:14:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[25bf 02-22 00:14:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[25c0 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[25c1 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[25c2 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[25c3 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[25c4 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[25c5 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[25c6 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036402c0 gate 1582330471102014600 evaluation starts
[25c7 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036402c0 signed by 0 principal evaluation starts (used [false])
[25c8 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036402c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[25c9 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036402c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[25ca 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036402c0 principal evaluation fails
[25cb 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036402c0 gate 1582330471102014600 evaluation fails
[25cc 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[25cd 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[25ce 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[25cf 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[25d0 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[25d1 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[25d2 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003640bc0 gate 1582330471104423200 evaluation starts
[25d3 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003640bc0 signed by 0 principal evaluation starts (used [false])
[25d4 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003640bc0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[25d5 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003640bc0 principal evaluation succeeds for identity 0
[25d6 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003640bc0 gate 1582330471104423200 evaluation succeeds
[25d7 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[25d8 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[25d9 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[25da 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[25db 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[25dc 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[25dd 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[25de 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[25df 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[25e0 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[25e1 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[25e2 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[25e3 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[25e4 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[25e5 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[25e6 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[25e7 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[25e8 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[25e9 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c900 gate 1582330471108894500 evaluation starts
[25ea 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c900 signed by 0 principal evaluation starts (used [false])
[25eb 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c900 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[25ec 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[25ed 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c900 principal evaluation fails
[25ee 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c900 gate 1582330471108894500 evaluation fails
[25ef 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[25f0 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[25f1 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[25f2 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[25f3 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[25f4 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[25f5 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d210 gate 1582330471109308500 evaluation starts
[25f6 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d210 signed by 0 principal evaluation starts (used [false])
[25f7 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d210 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[25f8 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d210 principal evaluation succeeds for identity 0
[25f9 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d210 gate 1582330471109308500 evaluation succeeds
[25fa 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[25fb 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[25fc 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[25fd 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[25fe 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[25ff 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[2600 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2601 02-22 00:14:31.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2602 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2603 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2604 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2605 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2606 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2607 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2608 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2609 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[260a 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[260b 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547340 gate 1582330471110343100 evaluation starts
[260c 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547340 signed by 0 principal evaluation starts (used [false])
[260d 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547340 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[260e 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[260f 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547340 principal evaluation fails
[2610 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547340 gate 1582330471110343100 evaluation fails
[2611 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2612 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2613 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2614 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2615 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2616 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2617 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547c40 gate 1582330471110748700 evaluation starts
[2618 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547c40 signed by 0 principal evaluation starts (used [false])
[2619 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547c40 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[261a 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547c40 principal evaluation succeeds for identity 0
[261b 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547c40 gate 1582330471110748700 evaluation succeeds
[261c 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[261d 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[261e 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[261f 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2620 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[2621 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[2622 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2623 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[2624 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[2625 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[2626 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[2627 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[2628 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2629 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[262a 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[262b 02-22 00:14:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[262c 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[262d 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[262e 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[262f 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2630 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2631 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2632 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2633 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003528ca0 gate 1582330471122981000 evaluation starts
[2634 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003528ca0 signed by 0 principal evaluation starts (used [false])
[2635 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003528ca0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2636 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003528ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2637 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003528ca0 principal evaluation fails
[2638 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003528ca0 gate 1582330471122981000 evaluation fails
[2639 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[263a 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[263b 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[263c 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[263d 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[263e 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[263f 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035295a0 gate 1582330471127698100 evaluation starts
[2640 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035295a0 signed by 0 principal evaluation starts (used [false])
[2641 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035295a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2642 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035295a0 principal evaluation succeeds for identity 0
[2643 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035295a0 gate 1582330471127698100 evaluation succeeds
[2644 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2645 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2646 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2647 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2648 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2649 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[264a 02-22 00:14:31.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[264b 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[264c 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[264d 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[264e 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[264f 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2650 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[2651 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2652 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2653 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003405010 gate 1582330471131714900 evaluation starts
[2654 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003405010 signed by 0 principal evaluation starts (used [false])
[2655 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003405010 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2656 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003405010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2657 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003405010 principal evaluation fails
[2658 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003405010 gate 1582330471131714900 evaluation fails
[2659 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[265a 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[265b 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[265c 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[265d 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[265e 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[265f 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003405910 gate 1582330471132619000 evaluation starts
[2660 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003405910 signed by 0 principal evaluation starts (used [false])
[2661 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003405910 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2662 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003405910 principal evaluation succeeds for identity 0
[2663 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003405910 gate 1582330471132619000 evaluation succeeds
[2664 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2665 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2666 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2667 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2668 02-22 00:14:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2669 02-22 00:14:31.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[266a 02-22 00:14:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[266b 02-22 00:14:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[266c 02-22 00:14:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[266d 02-22 00:14:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[266e 02-22 00:14:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5092857505968794784 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[266f 02-22 00:14:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5092857505968794784 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[2670 02-22 00:14:31.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 5092857505968794784 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[2671 02-22 00:14:31.16 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 5092857505968794784 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[2672 02-22 00:14:31.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2673 02-22 00:14:31.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2674 02-22 00:14:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[2675 02-22 00:14:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2676 02-22 00:14:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2677 02-22 00:14:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2678 02-22 00:14:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8470434903994203773 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[2679 02-22 00:14:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8470434903994203773 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[267a 02-22 00:14:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[267b 02-22 00:14:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[267c 02-22 00:14:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[267d 02-22 00:14:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[267e 02-22 00:14:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[267f 02-22 00:14:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2680 02-22 00:14:32.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2681 02-22 00:14:32.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[2682 02-22 00:14:32.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[2683 02-22 00:14:32.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2684 02-22 00:14:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2685 02-22 00:14:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2686 02-22 00:14:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2687 02-22 00:14:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Build output is go: downloading github.com/hyperledger/fabric-protos-go v0.0.0-20190823190507-26c33c998676
go: downloading github.com/hyperledger/fabric-chaincode-go v0.0.0-20190823162523-04390e015b85
go: extracting github.com/hyperledger/fabric-protos-go v0.0.0-20190823190507-26c33c998676
go: extracting github.com/hyperledger/fabric-chaincode-go v0.0.0-20190823162523-04390e015b85
go: downloading github.com/golang/protobuf v1.3.2
go: downloading google.golang.org/grpc v1.24.0
go: extracting github.com/golang/protobuf v1.3.2
go: extracting google.golang.org/grpc v1.24.0
go: downloading google.golang.org/genproto v0.0.0-20180831171423-11092d34479b
go: downloading golang.org/x/sys v0.0.0-20190710143415-6ec70d6a5542
go: downloading golang.org/x/net v0.0.0-20190522155817-f3200d17e092
go: extracting golang.org/x/sys v0.0.0-20190710143415-6ec70d6a5542
go: extracting golang.org/x/net v0.0.0-20190522155817-f3200d17e092
go: extracting google.golang.org/genproto v0.0.0-20180831171423-11092d34479b
go: downloading golang.org/x/text v0.3.0
go: extracting golang.org/x/text v0.3.0
go: finding github.com/hyperledger/fabric-chaincode-go v0.0.0-20190823162523-04390e015b85
go: finding github.com/hyperledger/fabric-protos-go v0.0.0-20190823190507-26c33c998676
go: finding github.com/golang/protobuf v1.3.2
go: finding google.golang.org/grpc v1.24.0
go: finding google.golang.org/genproto v0.0.0-20180831171423-11092d34479b
go: finding golang.org/x/net v0.0.0-20190522155817-f3200d17e092
go: finding golang.org/x/sys v0.0.0-20190710143415-6ec70d6a5542
go: finding golang.org/x/text v0.3.0
github.com/golang/protobuf/proto
golang.org/x/net/internal/timeseries
golang.org/x/net/trace
google.golang.org/grpc/grpclog
google.golang.org/grpc/connectivity
google.golang.org/grpc/credentials/internal
google.golang.org/grpc/internal
google.golang.org/grpc/metadata
google.golang.org/grpc/serviceconfig
google.golang.org/grpc/resolver
google.golang.org/grpc/internal/grpcrand
google.golang.org/grpc/codes
google.golang.org/grpc/encoding
google.golang.org/grpc/internal/backoff
google.golang.org/grpc/internal/balancerload
golang.org/x/sys/unix
github.com/golang/protobuf/ptypes/timestamp
github.com/hyperledger/fabric-protos-go/msp
github.com/hyperledger/fabric-protos-go/common
github.com/hyperledger/fabric-protos-go/ledger/rwset
google.golang.org/grpc/credentials
google.golang.org/grpc/balancer
google.golang.org/grpc/balancer/base
google.golang.org/grpc/encoding/proto
google.golang.org/grpc/balancer/roundrobin
github.com/golang/protobuf/ptypes/any
github.com/golang/protobuf/ptypes/duration
google.golang.org/genproto/googleapis/rpc/status
github.com/golang/protobuf/ptypes
google.golang.org/grpc/binarylog/grpc_binarylog_v1
google.golang.org/grpc/status
google.golang.org/grpc/internal/channelz
google.golang.org/grpc/internal/binarylog
google.golang.org/grpc/internal/envconfig
google.golang.org/grpc/internal/grpcsync
golang.org/x/text/transform
golang.org/x/text/unicode/bidi
golang.org/x/text/unicode/norm
golang.org/x/text/secure/bidirule
golang.org/x/net/http2/hpack
google.golang.org/grpc/internal/syscall
google.golang.org/grpc/keepalive
google.golang.org/grpc/peer
google.golang.org/grpc/stats
golang.org/x/net/idna
google.golang.org/grpc/tap
google.golang.org/grpc/naming
google.golang.org/grpc/resolver/dns
google.golang.org/grpc/resolver/passthrough
golang.org/x/net/http/httpguts
github.com/hyperledger/fabric-protos-go/ledger/queryresult
golang.org/x/net/http2
google.golang.org/grpc/internal/transport
google.golang.org/grpc
github.com/hyperledger/fabric-protos-go/peer
github.com/hyperledger/fabric-chaincode-go/shim/internal
github.com/hyperledger/fabric-chaincode-go/shim
examples/chaincode/go/chaincode_example02
Done!
[2688 02-22 00:14:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:14930465658033941554 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2689 02-22 00:14:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:14930465658033941554 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[268a 02-22 00:14:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[268b 02-22 00:14:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[268c 02-22 00:14:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[268d 02-22 00:14:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[268e 02-22 00:14:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[268f 02-22 00:14:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2690 02-22 00:14:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[2691 02-22 00:14:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2692 02-22 00:14:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2693 02-22 00:14:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2694 02-22 00:14:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2695 02-22 00:14:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2696 02-22 00:14:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c 82 ec f2 3a d4 8a ae 8f 5c 1b 16 0a e2 4f d4 |....:....\....O.|
00000010 d2 ba 20 1b 54 5c 76 28 99 5a 27 86 c8 c1 73 95 |.. .T\v(.Z'...s.|
[2697 02-22 00:14:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 a9 dd 00 d3 f8 6a 1b f1 13 5d e8 |0D. ......j...].|
00000010 cb 22 7a ed 86 d3 01 6e 83 91 ea 77 8a b9 8e a1 |."z....n...w....|
00000020 01 1d 44 8f 02 20 7c 25 68 fd 35 41 f3 5e fa 8b |..D.. |%h.5A.^..|
00000030 6f 1a 14 d4 dd 65 cb 02 aa 70 f7 95 fb fa 07 30 |o....e...p.....0|
00000040 30 94 a3 a5 89 7e |0....~|
[2698 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[2699 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[269a 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[269b 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[269c 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 e5 c2 5d ae 49 4b ba 3b dd 94 05 |0D. ...].IK.;...|
00000010 51 ec 93 89 2f 10 51 62 16 c8 84 2d 5b 23 1e 31 |Q.../.Qb...-[#.1|
00000020 e8 f2 53 51 02 20 1a 1a 9b a8 16 85 45 67 7b e6 |..SQ. ......Eg{.|
00000030 e1 3f 1d fd 1b 42 f8 d4 2a d7 86 a8 16 27 f5 20 |.?...B..*....'. |
00000040 76 3d 1b 91 ce b6 |v=....|
[269d 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[269e 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[269f 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:40
[26a0 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:40
[26a1 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[26a2 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26a3 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26a4 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26a5 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[26a6 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[26a7 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[26a8 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26a9 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[26aa 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[26ab 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[26ac 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[26ad 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[26ae 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[26af 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[26b0 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 4d ff 91 06 80 a1 72 91 c3 7a 3b 14 9d 91 d8 |.M.....r..z;....|
00000010 76 f1 de e9 36 f5 0a 9d 42 48 4e 30 05 6a 4e d6 |v...6...BHN0.jN.|
[26b1 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad b4 89 e4 49 8c c7 4b e9 de 2a |0E.!.....I..K..*|
00000010 97 53 19 83 e0 b4 41 05 02 1a 0a 93 94 aa 4f 46 |.S....A.......OF|
00000020 b6 20 3d e8 6a 02 20 3c 86 1a 66 b8 69 b4 5e 10 |. =.j. <..f.i.^.|
00000030 f5 ef 2b b6 7f c6 de aa 21 ee 10 40 30 e6 58 2a |..+.....!..@0.X*|
00000040 fe bc 17 bb 95 b0 e5 |.......|
[26b2 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[26b3 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003307e70 gate 1582330474297250300 evaluation starts
[26b4 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003307e70 signed by 0 principal evaluation starts (used [false])
[26b5 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003307e70 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[26b6 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003307e70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[26b7 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003307e70 principal evaluation fails
[26b8 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003307e70 gate 1582330474297250300 evaluation fails
[26b9 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[26ba 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[26bb 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[26bc 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 4d ff 91 06 80 a1 72 91 c3 7a 3b 14 9d 91 d8 |.M.....r..z;....|
00000010 76 f1 de e9 36 f5 0a 9d 42 48 4e 30 05 6a 4e d6 |v...6...BHN0.jN.|
[26bd 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad b4 89 e4 49 8c c7 4b e9 de 2a |0E.!.....I..K..*|
00000010 97 53 19 83 e0 b4 41 05 02 1a 0a 93 94 aa 4f 46 |.S....A.......OF|
00000020 b6 20 3d e8 6a 02 20 3c 86 1a 66 b8 69 b4 5e 10 |. =.j. <..f.i.^.|
00000030 f5 ef 2b b6 7f c6 de aa 21 ee 10 40 30 e6 58 2a |..+.....!..@0.X*|
00000040 fe bc 17 bb 95 b0 e5 |.......|
[26be 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[26bf 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032da790 gate 1582330474297636700 evaluation starts
[26c0 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032da790 signed by 0 principal evaluation starts (used [false])
[26c1 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032da790 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[26c2 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032da790 principal evaluation succeeds for identity 0
[26c3 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032da790 gate 1582330474297636700 evaluation succeeds
[26c4 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[26c5 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[26c6 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[26c7 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[26c8 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[26c9 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes]}
[26ca 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:39
[26cb 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:39
[26cc 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[26cd 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26ce 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26cf 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26d0 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[26d1 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26d2 02-22 00:14:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26d3 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[26d4 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26d5 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:11136806916543539205 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[26d6 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:11136806916543539205 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[26d7 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[26d8 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26d9 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[26da 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[26db 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[26dc 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c c9 b0 8a 97 09 cb ff c1 52 56 58 bf 32 c3 e0 |.........RVX.2..|
00000010 7a a4 4d 5a c8 25 42 64 51 5c 51 d3 ad 1d b9 05 |z.MZ.%BdQ\Q.....|
[26dd 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 36 75 f9 8a 17 45 db da 35 72 59 |0D. u6u...E..5rY|
00000010 d4 0a cf 12 d3 b8 38 0b 77 a5 dc de 7d 94 f9 42 |......8.w...}..B|
00000020 cc 9a 40 73 02 20 0b 33 a2 9e cd d5 4b c3 fd ff |..@s. .3....K...|
00000030 79 14 c0 4f 26 40 09 13 a7 b8 44 7d 48 0e 29 f7 |y..O&@....D}H.).|
00000040 ad 6d 08 58 58 2f |.m.XX/|
[26de 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[26df 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 23 8a 7e 8d f6 5d a2 69 9b 9e |0E.!..#.~..].i..|
00000010 c9 3b 10 c0 67 3c b2 33 6e 5f 8e 61 da 8c 2c 90 |.;..g<.3n_.a..,.|
00000020 b1 24 86 eb 93 02 20 6e b3 a0 be 00 2f 29 df 3c |.$.... n..../).<|
00000030 20 18 96 7d e2 96 06 19 9f 6e bb b0 c3 ec 74 b8 | ..}.....n....t.|
00000040 25 46 f0 14 f0 8a 6d |%F....m|
[26e0 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[26e1 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[26e2 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[26e3 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[26e4 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:41
[26e5 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:41
[26e6 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[26e7 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26e8 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26e9 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26ea 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[26eb 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26ec 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26ed 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[26ee 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[26ef 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[26f0 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[26f1 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[26f2 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[26f3 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26f4 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[26f5 02-22 00:14:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[26f6 02-22 00:14:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[26f7 02-22 00:14:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26f8 02-22 00:14:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[26f9 02-22 00:14:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26fa 02-22 00:14:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[26fb 02-22 00:14:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[26fc 02-22 00:14:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26fd 02-22 00:14:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[26fe 02-22 00:14:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[26ff 02-22 00:14:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2700 02-22 00:14:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2701 02-22 00:14:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2702 02-22 00:14:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2703 02-22 00:14:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2704 02-22 00:14:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2705 02-22 00:14:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2706 02-22 00:14:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2707 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2708 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:13398782101526022843 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[270a 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:13398782101526022843 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2709 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[270b 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13398782101526022843 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[270c 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[270d 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[270e 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[270f 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[2710 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2711 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2712 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[2713 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2714 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2715 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2716 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2717 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes
[2718 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2719 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[271a 02-22 00:14:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[271b 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[271c 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:8273431592445264251 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[271d 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[271e 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:3202997664027298343 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[271f 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[2720 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:25389787966171873 msg_type:IDENTITY_MSG > , Envelope: 15 bytes, Signature: 0 bytes to 1 peers
[2721 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:25389787966171873 msg_type:IDENTITY_MSG > , Envelope: 15 bytes, Signature: 0 bytes
[2722 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2723 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:8273431592445264251 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2724 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2725 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:3202997664027298343 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2726 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2727 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[2728 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2729 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[272a 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[272b 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[272c 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[272d 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[272e 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[272f 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2730 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2731 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2732 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 7f fa 74 78 d6 e0 8d 5a 14 0d df 67 97 df f2 |...tx...Z...g...|
00000010 f6 e9 5b 6a f0 32 64 52 75 a2 ea 57 cb d2 e4 bd |..[j.2dRu..W....|
[2733 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 d4 c2 07 ba f8 12 44 51 6c 62 |0E.!........DQlb|
00000010 a7 2a 5e 91 76 2d 4e 80 50 b2 2c 9c 8c 50 4a 27 |.*^.v-N.P.,..PJ'|
00000020 06 5f f6 0d 36 02 20 25 9e cf 7b d3 54 ba d3 e5 |._..6. %..{.T...|
00000030 c8 eb e3 55 ad fd 0f 01 8c 9a 4f 04 6c 6f b3 8b |...U......O.lo..|
00000040 d0 d4 91 df 5e 65 4c |....^eL|
[2734 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2735 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cf3a0 gate 1582330474365078200 evaluation starts
[2736 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cf3a0 signed by 0 principal evaluation starts (used [false])
[2737 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cf3a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2738 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cf3a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2739 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cf3a0 principal evaluation fails
[273a 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cf3a0 gate 1582330474365078200 evaluation fails
[273b 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[273c 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[273d 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[273e 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 7f fa 74 78 d6 e0 8d 5a 14 0d df 67 97 df f2 |...tx...Z...g...|
00000010 f6 e9 5b 6a f0 32 64 52 75 a2 ea 57 cb d2 e4 bd |..[j.2dRu..W....|
[273f 02-22 00:14:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 d4 c2 07 ba f8 12 44 51 6c 62 |0E.!........DQlb|
00000010 a7 2a 5e 91 76 2d 4e 80 50 b2 2c 9c 8c 50 4a 27 |.*^.v-N.P.,..PJ'|
00000020 06 5f f6 0d 36 02 20 25 9e cf 7b d3 54 ba d3 e5 |._..6. %..{.T...|
00000030 c8 eb e3 55 ad fd 0f 01 8c 9a 4f 04 6c 6f b3 8b |...U......O.lo..|
00000040 d0 d4 91 df 5e 65 4c |....^eL|
[2740 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2742 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cfdc0 gate 1582330474373477000 evaluation starts
[2741 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 25389787966171873 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 152 bytes, Signature: 0 bytes
[2743 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cfdc0 signed by 0 principal evaluation starts (used [false])
[2744 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 25389787966171873 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 152 bytes, Signature: 0 bytes
[2745 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cfdc0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2746 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cfdc0 principal evaluation succeeds for identity 0
[2747 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 25389787966171873 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 152 bytes, Signature: 0 bytes
[2748 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cfdc0 gate 1582330474373477000 evaluation succeeds
[274a 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2749 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[274b 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[274c 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[274d 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[274e 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes
[274f 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3202997664027298343 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[2750 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes]}
[2751 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:37
[2752 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3202997664027298343 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[2753 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:37
[2754 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[2755 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2756 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2757 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2758 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[2759 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[275a 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[275b 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[275c 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[275d 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8273431592445264251 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[275e 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[275f 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[2760 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[2761 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8273431592445264251 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[2762 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2763 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2764 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[2765 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[2766 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA15100B1801
[2767 02-22 00:14:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 46980F36E0797B361E6C956B4B717AB9F01277B27E86C2F3131973AF9A7097F0
[2768 02-22 00:14:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[2769 02-22 00:14:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[276a 02-22 00:14:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[276b 02-22 00:14:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[276c 02-22 00:14:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[276d 02-22 00:14:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[276e 02-22 00:14:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[276f 02-22 00:14:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2770 02-22 00:14:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[2771 02-22 00:14:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2772 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2773 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2774 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2775 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2776 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[2777 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2778 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2779 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[277a 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[277b 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[277c 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[277d 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[277e 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 22 46 aa dd 77 c3 05 aa d7 9d d6 11 25 48 b9 |."F..w.......%H.|
00000010 30 c6 cc a2 12 d5 2f d9 4f 5d 59 46 1d 5e 65 fb |0...../.O]YF.^e.|
[277f 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 1e b2 7b 0b 90 6e 37 c0 84 86 ea |0D. W..{..n7....|
00000010 2f d7 a9 0c a9 d0 ba ef 77 53 72 42 4c 06 f5 f2 |/.......wSrBL...|
00000020 83 fb 28 b2 02 20 69 1e fe a3 9d 7f 5d 61 72 c8 |..(.. i.....]ar.|
00000030 25 74 83 7b 43 ee 31 3a 18 c1 ee ba b7 ea e6 16 |%t.{C.1:........|
00000040 be 61 78 7c b1 20 |.ax|. |
[2780 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2781 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308ce70 gate 1582330474401624600 evaluation starts
[2782 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308ce70 signed by 0 principal evaluation starts (used [false])
[2783 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308ce70 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2784 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308ce70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2785 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308ce70 principal evaluation fails
[2786 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308ce70 gate 1582330474401624600 evaluation fails
[2787 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2788 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2789 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[278a 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 22 46 aa dd 77 c3 05 aa d7 9d d6 11 25 48 b9 |."F..w.......%H.|
00000010 30 c6 cc a2 12 d5 2f d9 4f 5d 59 46 1d 5e 65 fb |0...../.O]YF.^e.|
[278b 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 1e b2 7b 0b 90 6e 37 c0 84 86 ea |0D. W..{..n7....|
00000010 2f d7 a9 0c a9 d0 ba ef 77 53 72 42 4c 06 f5 f2 |/.......wSrBL...|
00000020 83 fb 28 b2 02 20 69 1e fe a3 9d 7f 5d 61 72 c8 |..(.. i.....]ar.|
00000030 25 74 83 7b 43 ee 31 3a 18 c1 ee ba b7 ea e6 16 |%t.{C.1:........|
00000040 be 61 78 7c b1 20 |.ax|. |
[278c 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[278d 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308d770 gate 1582330474402133900 evaluation starts
[278e 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308d770 signed by 0 principal evaluation starts (used [false])
[278f 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308d770 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2790 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308d770 principal evaluation succeeds for identity 0
[2791 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308d770 gate 1582330474402133900 evaluation succeeds
[2792 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2793 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2794 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2795 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2796 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2797 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes]}
[2798 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:40
[2799 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:40
[279a 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[279b 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[279c 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[279d 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[279e 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[279f 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27a0 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27a1 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27a2 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[27a3 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[27a4 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[27a5 02-22 00:14:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[27a6 02-22 00:14:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[27a7 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[27a8 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[27a9 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[27aa 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27ab 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[27ac 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[27ad 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[27ae 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[27af 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[27b0 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[27b1 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 20 d6 20 2d fa 9b 24 21 45 e0 3a 84 e1 92 af |% . -..$!E.:....|
00000010 e5 fc 80 d7 71 1c b8 b4 01 86 94 24 7f 48 9c ed |....q......$.H..|
[27b2 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 fe af 8f 62 65 06 21 5d 34 9c |0E.!.....be.!]4.|
00000010 0d ed 4a c8 8e 9c 3b 18 c7 4a 56 da 72 12 b3 9b |..J...;..JV.r...|
00000020 c5 dd 2a a2 d3 02 20 6f 60 a1 ab 68 72 26 f4 ca |..*... o`..hr&..|
00000030 ff 9b db e0 c4 91 0a 93 fa 95 77 6c 71 67 44 20 |..........wlqgD |
00000040 39 15 83 50 4a 26 df |9..PJ&.|
[27b3 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[27b4 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb02c0 gate 1582330474421003000 evaluation starts
[27b5 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb02c0 signed by 0 principal evaluation starts (used [false])
[27b6 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb02c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[27b7 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb02c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[27b8 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb02c0 principal evaluation fails
[27b9 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb02c0 gate 1582330474421003000 evaluation fails
[27ba 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[27bb 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[27bc 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[27bd 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 20 d6 20 2d fa 9b 24 21 45 e0 3a 84 e1 92 af |% . -..$!E.:....|
00000010 e5 fc 80 d7 71 1c b8 b4 01 86 94 24 7f 48 9c ed |....q......$.H..|
[27be 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 fe af 8f 62 65 06 21 5d 34 9c |0E.!.....be.!]4.|
00000010 0d ed 4a c8 8e 9c 3b 18 c7 4a 56 da 72 12 b3 9b |..J...;..JV.r...|
00000020 c5 dd 2a a2 d3 02 20 6f 60 a1 ab 68 72 26 f4 ca |..*... o`..hr&..|
00000030 ff 9b db e0 c4 91 0a 93 fa 95 77 6c 71 67 44 20 |..........wlqgD |
00000040 39 15 83 50 4a 26 df |9..PJ&.|
[27bf 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[27c0 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb0bc0 gate 1582330474421432500 evaluation starts
[27c1 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb0bc0 signed by 0 principal evaluation starts (used [false])
[27c2 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb0bc0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[27c3 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb0bc0 principal evaluation succeeds for identity 0
[27c4 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb0bc0 gate 1582330474421432500 evaluation succeeds
[27c5 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[27c6 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[27c7 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[27c8 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[27c9 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[27ca 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes]}
[27cb 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:38
[27cc 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:38
[27cd 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[27ce 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[27cf 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[27d0 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[27d1 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27d2 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27d3 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27d4 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27d5 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27d6 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27d7 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[27d8 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27d9 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27da 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[27db 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[27dc 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[27dd 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[27de 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[27df 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[27e0 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[27e1 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[27e2 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[27e3 02-22 00:14:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[27e4 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[27e5 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[27e6 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[27e7 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[27e8 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151024
[27e9 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 840E9E6DE415E9FA66D942BEA6118160CB5102EBE415206DDA2B0103F6E02BFF
[27ea 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[27eb 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[27ec 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[27ed 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27ee 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[27ef 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[27f0 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[27f1 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[27f2 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[27f3 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[27f4 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[27f5 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[27f6 02-22 00:14:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[27f7 02-22 00:14:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[27f8 02-22 00:14:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[27f9 02-22 00:14:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[27fa 02-22 00:14:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[27fb 02-22 00:14:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[27fc 02-22 00:14:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 0e 9e 6d e4 15 e9 fa 66 d9 42 be a6 11 81 60 |...m....f.B....`|
00000010 cb 51 02 eb e4 15 20 6d da 2b 01 03 f6 e0 2b ff |.Q.... m.+....+.|
[27fd 02-22 00:14:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 4d ba 13 59 32 cf ec be 4f 59 de |0D. .M..Y2...OY.|
00000010 85 c5 e9 c0 25 77 aa c8 b9 25 9f 6c 4f a0 b4 e1 |....%w...%.lO...|
00000020 15 ec 67 3e 02 20 69 7f 0a c5 d0 d9 da 71 a0 ff |..g>. i......q..|
00000030 e3 c2 ce b1 fe c9 38 93 4e 10 cf 79 17 d4 df 0e |......8.N..y....|
00000040 b4 13 fa c0 d1 35 |.....5|
[27fe 02-22 00:14:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes
[27ff 02-22 00:14:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes
[2800 02-22 00:14:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2801 02-22 00:14:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2802 02-22 00:14:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c c9 b0 8a 97 09 cb ff c1 52 56 58 bf 32 c3 e0 |.........RVX.2..|
00000010 7a a4 4d 5a c8 25 42 64 51 5c 51 d3 ad 1d b9 05 |z.MZ.%BdQ\Q.....|
[2803 02-22 00:14:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 36 75 f9 8a 17 45 db da 35 72 59 |0D. u6u...E..5rY|
00000010 d4 0a cf 12 d3 b8 38 0b 77 a5 dc de 7d 94 f9 42 |......8.w...}..B|
00000020 cc 9a 40 73 02 20 0b 33 a2 9e cd d5 4b c3 fd ff |..@s. .3....K...|
00000030 79 14 c0 4f 26 40 09 13 a7 b8 44 7d 48 0e 29 f7 |y..O&@....D}H.).|
00000040 ad 6d 08 58 58 2f |.m.XX/|
[2804 02-22 00:14:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes
[2805 02-22 00:14:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2806 02-22 00:14:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2807 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151025
[2808 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C66F88B55C72EE9D3F92E8FB59419021E440AB56992961E13FC693DBC34D5706
[2809 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[280a 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[280b 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[280c 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[280d 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[280e 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[280f 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[2810 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 0e 9e 6d e4 15 e9 fa 66 d9 42 be a6 11 81 60 |...m....f.B....`|
00000010 cb 51 02 eb e4 15 20 6d da 2b 01 03 f6 e0 2b ff |.Q.... m.+....+.|
[2811 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 4d ba 13 59 32 cf ec be 4f 59 de |0D. .M..Y2...OY.|
00000010 85 c5 e9 c0 25 77 aa c8 b9 25 9f 6c 4f a0 b4 e1 |....%w...%.lO...|
00000020 15 ec 67 3e 02 20 69 7f 0a c5 d0 d9 da 71 a0 ff |..g>. i......q..|
00000030 e3 c2 ce b1 fe c9 38 93 4e 10 cf 79 17 d4 df 0e |......8.N..y....|
00000040 b4 13 fa c0 d1 35 |.....5|
[2812 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[2813 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee d0 3c 95 0b c6 98 97 ab 78 cb |0E.!...<......x.|
00000010 b3 f5 87 72 a1 bf fb 86 fc f1 02 08 05 34 8d 69 |...r.........4.i|
00000020 81 ac 25 cf 3b 02 20 31 90 a9 a0 70 6c c5 56 99 |..%.;. 1...pl.V.|
00000030 9a 5f d4 9c 92 e1 16 5b be bd 6e 54 7b bb 74 a1 |._.....[..nT{.t.|
00000040 4b b9 30 bb 7c 0e 18 |K.0.|..|
[2814 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2815 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2816 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2817 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2818 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2819 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[281a 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[281b 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[281c 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[281d 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[281e 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[281f 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[2820 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2821 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2822 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2823 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes
[2824 02-22 00:14:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2825 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[2826 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2827 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[2828 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[2829 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 0e 9e 6d e4 15 e9 fa 66 d9 42 be a6 11 81 60 |...m....f.B....`|
00000010 cb 51 02 eb e4 15 20 6d da 2b 01 03 f6 e0 2b ff |.Q.... m.+....+.|
[282a 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 4d ba 13 59 32 cf ec be 4f 59 de |0D. .M..Y2...OY.|
00000010 85 c5 e9 c0 25 77 aa c8 b9 25 9f 6c 4f a0 b4 e1 |....%w...%.lO...|
00000020 15 ec 67 3e 02 20 69 7f 0a c5 d0 d9 da 71 a0 ff |..g>. i......q..|
00000030 e3 c2 ce b1 fe c9 38 93 4e 10 cf 79 17 d4 df 0e |......8.N..y....|
00000040 b4 13 fa c0 d1 35 |.....5|
[282b 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes
[282c 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes
[282d 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[282e 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[282f 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c c9 b0 8a 97 09 cb ff c1 52 56 58 bf 32 c3 e0 |.........RVX.2..|
00000010 7a a4 4d 5a c8 25 42 64 51 5c 51 d3 ad 1d b9 05 |z.MZ.%BdQ\Q.....|
[2830 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 36 75 f9 8a 17 45 db da 35 72 59 |0D. u6u...E..5rY|
00000010 d4 0a cf 12 d3 b8 38 0b 77 a5 dc de 7d 94 f9 42 |......8.w...}..B|
00000020 cc 9a 40 73 02 20 0b 33 a2 9e cd d5 4b c3 fd ff |..@s. .3....K...|
00000030 79 14 c0 4f 26 40 09 13 a7 b8 44 7d 48 0e 29 f7 |y..O&@....D}H.).|
00000040 ad 6d 08 58 58 2f |.m.XX/|
[2831 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes
[2832 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2833 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[2834 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2835 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2836 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2837 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2838 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2839 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[283a 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[283b 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 22 46 aa dd 77 c3 05 aa d7 9d d6 11 25 48 b9 |."F..w.......%H.|
00000010 30 c6 cc a2 12 d5 2f d9 4f 5d 59 46 1d 5e 65 fb |0...../.O]YF.^e.|
[283c 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 1e b2 7b 0b 90 6e 37 c0 84 86 ea |0D. W..{..n7....|
00000010 2f d7 a9 0c a9 d0 ba ef 77 53 72 42 4c 06 f5 f2 |/.......wSrBL...|
00000020 83 fb 28 b2 02 20 69 1e fe a3 9d 7f 5d 61 72 c8 |..(.. i.....]ar.|
00000030 25 74 83 7b 43 ee 31 3a 18 c1 ee ba b7 ea e6 16 |%t.{C.1:........|
00000040 be 61 78 7c b1 20 |.ax|. |
[283d 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[283e 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3460 gate 1582330474546373100 evaluation starts
[283f 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3460 signed by 0 principal evaluation starts (used [false])
[2840 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3460 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2841 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2842 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3460 principal evaluation fails
[2843 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3460 gate 1582330474546373100 evaluation fails
[2844 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2845 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2846 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2847 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 22 46 aa dd 77 c3 05 aa d7 9d d6 11 25 48 b9 |."F..w.......%H.|
00000010 30 c6 cc a2 12 d5 2f d9 4f 5d 59 46 1d 5e 65 fb |0...../.O]YF.^e.|
[2848 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 1e b2 7b 0b 90 6e 37 c0 84 86 ea |0D. W..{..n7....|
00000010 2f d7 a9 0c a9 d0 ba ef 77 53 72 42 4c 06 f5 f2 |/.......wSrBL...|
00000020 83 fb 28 b2 02 20 69 1e fe a3 9d 7f 5d 61 72 c8 |..(.. i.....]ar.|
00000030 25 74 83 7b 43 ee 31 3a 18 c1 ee ba b7 ea e6 16 |%t.{C.1:........|
00000040 be 61 78 7c b1 20 |.ax|. |
[2849 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[284a 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3d80 gate 1582330474547800000 evaluation starts
[284b 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3d80 signed by 0 principal evaluation starts (used [false])
[284c 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3d80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[284d 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3d80 principal evaluation succeeds for identity 0
[284e 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3d80 gate 1582330474547800000 evaluation succeeds
[284f 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2850 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2851 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2852 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2853 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2854 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2855 02-22 00:14:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2856 02-22 00:14:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2857 02-22 00:14:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2858 02-22 00:14:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[2859 02-22 00:14:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[285a 02-22 00:14:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[285b 02-22 00:14:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[285c 02-22 00:14:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[285d 02-22 00:14:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[285e 02-22 00:14:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[285f 02-22 00:14:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[2860 02-22 00:14:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2861 02-22 00:14:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2862 02-22 00:14:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2864 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2863 02-22 00:14:35.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[2865 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2866 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2867 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2868 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2869 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[286a 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[286b 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[286c 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[286d 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b58cb0 gate 1582330475086461500 evaluation starts
[286e 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b58cb0 signed by 0 principal evaluation starts (used [false])
[286f 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b58cb0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2870 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b58cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2871 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b58cb0 principal evaluation fails
[2872 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b58cb0 gate 1582330475086461500 evaluation fails
[2873 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2874 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2875 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2876 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2877 02-22 00:14:35.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2878 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2879 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b59630 gate 1582330475090697700 evaluation starts
[287a 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b59630 signed by 0 principal evaluation starts (used [false])
[287b 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b59630 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[287c 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b59630 principal evaluation succeeds for identity 0
[287d 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b59630 gate 1582330475090697700 evaluation succeeds
[287e 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[287f 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2880 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2881 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2882 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[2883 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[2884 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[2885 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[2886 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2887 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2888 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2889 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[288a 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[288b 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[288c 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[288d 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[288e 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[288f 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2890 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2891 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f0170 gate 1582330475098226200 evaluation starts
[2892 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f0170 signed by 0 principal evaluation starts (used [false])
[2893 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f0170 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2894 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f0170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2895 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f0170 principal evaluation fails
[2896 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f0170 gate 1582330475098226200 evaluation fails
[2897 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2898 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2899 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[289a 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[289b 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[289c 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[289d 02-22 00:14:35.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f0a80 gate 1582330475099888900 evaluation starts
[289e 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f0a80 signed by 0 principal evaluation starts (used [false])
[289f 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f0a80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[28a0 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f0a80 principal evaluation succeeds for identity 0
[28a1 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f0a80 gate 1582330475099888900 evaluation succeeds
[28a2 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[28a3 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[28a4 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[28a5 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[28a6 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[28a7 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[28a8 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[28a9 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[28aa 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[28ab 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[28ac 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28ad 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28ae 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[28af 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[28b0 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[28b1 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[28b2 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[28b3 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[28b4 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[28b5 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[28b6 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[28b7 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c6870 gate 1582330475109774200 evaluation starts
[28b8 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c6870 signed by 0 principal evaluation starts (used [false])
[28b9 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c6870 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[28ba 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c6870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[28bb 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c6870 principal evaluation fails
[28bc 02-22 00:14:35.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c6870 gate 1582330475109774200 evaluation fails
[28bd 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[28be 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[28bf 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[28c0 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[28c1 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[28c2 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[28c3 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c7420 gate 1582330475110674700 evaluation starts
[28c4 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c7420 signed by 0 principal evaluation starts (used [false])
[28c5 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c7420 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[28c6 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c7420 principal evaluation succeeds for identity 0
[28c7 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c7420 gate 1582330475110674700 evaluation succeeds
[28c8 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[28c9 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[28ca 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[28cb 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[28cc 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28cd 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28ce 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[28cf 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[28d0 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[28d1 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[28d2 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[28d3 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[28d4 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[28d5 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[28d6 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[28d7 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d74d0 gate 1582330475112454700 evaluation starts
[28d8 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d74d0 signed by 0 principal evaluation starts (used [false])
[28d9 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d74d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[28da 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d74d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[28db 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d74d0 principal evaluation fails
[28dc 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d74d0 gate 1582330475112454700 evaluation fails
[28dd 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[28de 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[28df 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[28e0 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[28e1 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[28e2 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[28e3 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d7dd0 gate 1582330475113161900 evaluation starts
[28e4 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d7dd0 signed by 0 principal evaluation starts (used [false])
[28e5 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d7dd0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[28e6 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d7dd0 principal evaluation succeeds for identity 0
[28e7 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d7dd0 gate 1582330475113161900 evaluation succeeds
[28e8 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[28e9 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[28ea 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[28eb 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[28ec 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[28ed 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[28ee 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28ef 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28f0 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[28f1 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[28f2 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[28f3 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[28f4 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[28f5 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[28f6 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[28f7 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[28f8 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[28f9 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[28fa 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008c3ae0 gate 1582330475115560300 evaluation starts
[28fb 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008c3ae0 signed by 0 principal evaluation starts (used [false])
[28fc 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008c3ae0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[28fd 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008c3ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[28fe 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008c3ae0 principal evaluation fails
[28ff 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008c3ae0 gate 1582330475115560300 evaluation fails
[2900 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2901 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2902 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2903 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[2904 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2905 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2906 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038c400 gate 1582330475116487300 evaluation starts
[2907 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038c400 signed by 0 principal evaluation starts (used [false])
[2908 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038c400 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2909 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038c400 principal evaluation succeeds for identity 0
[290a 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038c400 gate 1582330475116487300 evaluation succeeds
[290b 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[290c 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[290d 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[290e 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[290f 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[2910 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[2911 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2912 02-22 00:14:35.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2913 02-22 00:14:35.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2914 02-22 00:14:35.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2915 02-22 00:14:35.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2916 02-22 00:14:35.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2917 02-22 00:14:35.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2918 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2919 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[291a 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[291b 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[291c 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375630 gate 1582330475130576600 evaluation starts
[291d 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375630 signed by 0 principal evaluation starts (used [false])
[291e 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375630 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[291f 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2920 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375630 principal evaluation fails
[2921 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375630 gate 1582330475130576600 evaluation fails
[2922 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2923 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2924 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2925 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2926 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2927 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2928 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344130 gate 1582330475131176800 evaluation starts
[2929 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344130 signed by 0 principal evaluation starts (used [false])
[292a 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344130 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[292b 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344130 principal evaluation succeeds for identity 0
[292c 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344130 gate 1582330475131176800 evaluation succeeds
[292d 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[292e 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[292f 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2930 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2931 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[2932 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[2933 02-22 00:14:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2934 02-22 00:14:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2935 02-22 00:14:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2936 02-22 00:14:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[2937 02-22 00:14:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2938 02-22 00:14:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2939 02-22 00:14:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3022411050760330742 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[293a 02-22 00:14:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3022411050760330742 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[293b 02-22 00:14:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[293c 02-22 00:14:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3022411050760330742 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[293d 02-22 00:14:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3022411050760330742 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[293e 02-22 00:14:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[293f 02-22 00:14:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[2940 02-22 00:14:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2941 02-22 00:14:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2942 02-22 00:14:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2943 02-22 00:14:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5321161421539765437 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[2944 02-22 00:14:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5321161421539765437 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[2945 02-22 00:14:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[2946 02-22 00:14:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2947 02-22 00:14:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[2948 02-22 00:14:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2949 02-22 00:14:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[294a 02-22 00:14:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[294b 02-22 00:14:35.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[294c 02-22 00:14:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[294d 02-22 00:14:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[294e 02-22 00:14:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[294f 02-22 00:14:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2950 02-22 00:14:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2951 02-22 00:14:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2952 02-22 00:14:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Created image: dev-peer0.org1.example.com-exp02-4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8-c6fa44085d76984cdb63d55a77cdc479608bc5aa3e8d36ba69fdd94becaa2f46
[2953 02-22 00:14:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU ProcessInstallEvent() - localChaincode = &{exp02:4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8 golang examples/chaincode/go/chaincode_example02 exp02}
[2954 02-22 00:14:37.34 UTC] [%{longpkg}] %{callpath} -> DEBU skipping build of chaincode 'exp02:4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8' as it is already in progress
[2955 02-22 00:14:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar
[2956 02-22 00:14:37.57 UTC] [%{longpkg}] %{callpath} -> INFO Successfully installed chaincode with package ID 'exp02:4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8'
[2957 02-22 00:14:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU [c0784732] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[2958 02-22 00:14:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU [c0784732] notifying Txid:c0784732fcc1d2ed8b5c6fb742c1f52221e33c241e0904da17266ca1ed71abd6, channelID:
[2959 02-22 00:14:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[295a 02-22 00:14:37.58 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: _lifecycle duration: 40996ms channel= txID=c0784732
[295b 02-22 00:14:37.58 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44830 grpc.code=OK grpc.call_duration=41.0247898s
[295c 02-22 00:14:37.77 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[295d 02-22 00:14:37.77 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[295e 02-22 00:14:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:6372968398294026528 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[295f 02-22 00:14:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:6372968398294026528 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2960 02-22 00:14:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2961 02-22 00:14:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2962 02-22 00:14:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2963 02-22 00:14:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2964 02-22 00:14:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2965 02-22 00:14:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2966 02-22 00:14:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[2967 02-22 00:14:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2968 02-22 00:14:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[2969 02-22 00:14:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[296a 02-22 00:14:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[296b 02-22 00:14:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[296c 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 72 b1 a9 30 40 1c ff be bc a3 95 c6 92 ec e0 |.r..0@..........|
00000010 d8 b5 3b e1 7e f3 aa 5f 65 15 6d 33 f4 c3 b1 98 |..;.~.._e.m3....|
[296d 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 d2 01 45 da 6c da a4 15 8e ec |0E.!....E.l.....|
00000010 4c 74 16 16 fe be 6d 1b 2d 49 68 4c 35 14 86 08 |Lt....m.-IhL5...|
00000020 f1 62 96 11 73 02 20 17 02 13 c5 d3 45 75 fb 9e |.b..s. .....Eu..|
00000030 27 6c 47 96 ee 64 55 06 aa 12 22 e6 b7 61 d4 ca |'lG..dU..."..a..|
00000040 a1 fe 06 3c 3c 0f d2 |...<<..|
[296e 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[296f 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 51 44 91 6b ea 50 e7 d8 ad 62 93 |0D. ;QD.k.P...b.|
00000010 4f 36 82 6f 76 e8 73 a8 38 bc 29 bf c8 ce 2a 9b |O6.ov.s.8.)...*.|
00000020 98 ed 59 fb 02 20 21 c4 20 4a df 10 94 ed bf c6 |..Y.. !. J......|
00000030 8a d8 78 ea 26 9e 84 65 55 72 be ca 36 0e d3 b5 |..x.&..eUr..6...|
00000040 41 cd e8 92 9c 30 |A....0|
[2970 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2971 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[2972 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:42
[2973 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:42
[2974 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[2975 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2976 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2977 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2978 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[2979 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[297a 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[297b 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[297c 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[297d 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[297e 02-22 00:14:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[297f 02-22 00:14:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:2992634492912912311 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2980 02-22 00:14:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:2992634492912912311 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2981 02-22 00:14:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[2982 02-22 00:14:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2983 02-22 00:14:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:1634606613893111066 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2984 02-22 00:14:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:1634606613893111066 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2985 02-22 00:14:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1634606613893111066 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2986 02-22 00:14:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2987 02-22 00:14:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2988 02-22 00:14:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2989 02-22 00:14:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[298a 02-22 00:14:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[298b 02-22 00:14:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[298c 02-22 00:14:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[298d 02-22 00:14:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[298e 02-22 00:14:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[298f 02-22 00:14:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:12149374953811748807 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[2990 02-22 00:14:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[2991 02-22 00:14:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:9230971945613116528 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[2992 02-22 00:14:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[2993 02-22 00:14:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:12149374953811748807 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2994 02-22 00:14:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2995 02-22 00:14:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:993526738943232256 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[2997 02-22 00:14:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:993526738943232256 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2998 02-22 00:14:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2996 02-22 00:14:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:9230971945613116528 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2999 02-22 00:14:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[299a 02-22 00:14:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9230971945613116528 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 154 bytes, Signature: 0 bytes
[299b 02-22 00:14:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9230971945613116528 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 154 bytes, Signature: 0 bytes
[299c 02-22 00:14:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[299d 02-22 00:14:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 993526738943232256 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[299e 02-22 00:14:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 993526738943232256 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[299f 02-22 00:14:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29a0 02-22 00:14:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151026
[29a1 02-22 00:14:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C0CC9ADBC049810AF6D404167039413924F19D4108A99347AAB641BCB40825B2
[29a2 02-22 00:14:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[29a3 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[29a4 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29a5 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[29a6 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[29a7 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[29a8 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[29a9 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[29aa 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[29ab 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[29ac 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[29ad 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[29ae 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 15 e9 5b 4b 8a dc 6a d9 49 5f 44 ed 9a a3 f7 |...[K..j.I_D....|
00000010 ee 0c 3d 4f 65 ec 7d eb 26 9e 9b 09 84 65 24 f4 |..=Oe.}.&....e$.|
[29af 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 17 91 a4 11 ec 27 f8 9f 96 82 21 |0D. V.....'....!|
00000010 3e ad 25 ce e6 41 9e 2e 41 6d 38 cf ab 4b 06 35 |>.%..A..Am8..K.5|
00000020 df ab e0 e6 02 20 6f 7f c7 44 0f fc 65 4e 32 6b |..... o..D..eN2k|
00000030 75 30 3a 2f 23 a3 4d 7e bf 2f ae 04 79 f9 18 8f |u0:/#.M~./..y...|
00000040 3c 0b 3a f2 5c 63 |<.:.\c|
[29b0 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[29b1 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a32990 gate 1582330478476383100 evaluation starts
[29b2 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a32990 signed by 0 principal evaluation starts (used [false])
[29b3 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a32990 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[29b4 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a32990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[29b5 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a32990 principal evaluation fails
[29b6 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a32990 gate 1582330478476383100 evaluation fails
[29b7 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[29b8 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[29b9 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[29ba 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 15 e9 5b 4b 8a dc 6a d9 49 5f 44 ed 9a a3 f7 |...[K..j.I_D....|
00000010 ee 0c 3d 4f 65 ec 7d eb 26 9e 9b 09 84 65 24 f4 |..=Oe.}.&....e$.|
[29bb 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 17 91 a4 11 ec 27 f8 9f 96 82 21 |0D. V.....'....!|
00000010 3e ad 25 ce e6 41 9e 2e 41 6d 38 cf ab 4b 06 35 |>.%..A..Am8..K.5|
00000020 df ab e0 e6 02 20 6f 7f c7 44 0f fc 65 4e 32 6b |..... o..D..eN2k|
00000030 75 30 3a 2f 23 a3 4d 7e bf 2f ae 04 79 f9 18 8f |u0:/#.M~./..y...|
00000040 3c 0b 3a f2 5c 63 |<.:.\c|
[29bc 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[29bd 02-22 00:14:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a333a0 gate 1582330478477178700 evaluation starts
[29be 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[29bf 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12149374953811748807 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 154 bytes, Signature: 0 bytes
[29c0 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[29c1 02-22 00:14:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[29c2 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[29c3 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[29c4 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[29c5 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[29c6 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[29c7 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[29c8 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29c9 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a333a0 signed by 0 principal evaluation starts (used [false])
[29cc 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a333a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[29cd 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a333a0 principal evaluation succeeds for identity 0
[29ce 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a333a0 gate 1582330478477178700 evaluation succeeds
[29cf 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[29d0 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[29d1 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[29d2 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[29d3 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes
[29d4 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes]}
[29d5 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:39
[29d6 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:39
[29d7 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[29d8 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29d9 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29da 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29db 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[29dc 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[29dd 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[29ca 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[29de 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29cb 02-22 00:14:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[29df 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29e0 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[29e1 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[29e2 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[29e3 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[29e4 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[29e5 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[29e6 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[29e7 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29e8 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29e9 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12149374953811748807 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 154 bytes, Signature: 0 bytes
[29ea 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12149374953811748807 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 154 bytes, Signature: 0 bytes
[29eb 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[29ec 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[29ed 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[29ee 02-22 00:14:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[29ef 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[29f0 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[29f1 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[29f2 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[29f3 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[29f4 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 fd 3a 19 42 63 55 53 12 00 da cf ca 09 aa cd |F.:.BcUS........|
00000010 df e1 2f 8d 11 df 40 c7 ba 66 59 63 56 d9 9f 45 |../...@..fYcV..E|
[29f5 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 b8 57 fd e6 16 37 39 7e 84 5b 6e |0D. ..W...79~.[n|
00000010 f4 a7 b0 c9 dd 88 a6 0d 7a 34 82 12 bb d2 3b 03 |........z4....;.|
00000020 3a f8 4b b7 02 20 5a 25 5c 91 06 34 e3 6c 6c 8a |:.K.. Z%\..4.ll.|
00000030 51 3e a2 68 65 90 50 36 2f a0 37 c5 9a 4f 62 4c |Q>.he.P6/.7..ObL|
00000040 3e 6a dd 3f 0d 19 |>j.?..|
[29f6 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[29f7 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae2780 gate 1582330478534124700 evaluation starts
[29f8 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae2780 signed by 0 principal evaluation starts (used [false])
[29f9 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae2780 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[29fa 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae2780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[29fb 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae2780 principal evaluation fails
[29fc 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae2780 gate 1582330478534124700 evaluation fails
[29fd 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[29fe 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[29ff 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2a00 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 fd 3a 19 42 63 55 53 12 00 da cf ca 09 aa cd |F.:.BcUS........|
00000010 df e1 2f 8d 11 df 40 c7 ba 66 59 63 56 d9 9f 45 |../...@..fYcV..E|
[2a01 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 b8 57 fd e6 16 37 39 7e 84 5b 6e |0D. ..W...79~.[n|
00000010 f4 a7 b0 c9 dd 88 a6 0d 7a 34 82 12 bb d2 3b 03 |........z4....;.|
00000020 3a f8 4b b7 02 20 5a 25 5c 91 06 34 e3 6c 6c 8a |:.K.. Z%\..4.ll.|
00000030 51 3e a2 68 65 90 50 36 2f a0 37 c5 9a 4f 62 4c |Q>.he.P6/.7..ObL|
00000040 3e 6a dd 3f 0d 19 |>j.?..|
[2a02 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2a03 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae3090 gate 1582330478534987900 evaluation starts
[2a04 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae3090 signed by 0 principal evaluation starts (used [false])
[2a05 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae3090 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2a06 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae3090 principal evaluation succeeds for identity 0
[2a07 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae3090 gate 1582330478534987900 evaluation succeeds
[2a08 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2a09 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2a0a 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2a0b 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2a0c 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes
[2a0d 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes]}
[2a0e 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:41
[2a0f 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:41
[2a10 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[2a11 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a12 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a13 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a14 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[2a15 02-22 00:14:38.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[2a16 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 cc 9a db c0 49 81 0a f6 d4 04 16 70 39 41 39 |.....I......p9A9|
00000010 24 f1 9d 41 08 a9 93 47 aa b6 41 bc b4 08 25 b2 |$..A...G..A...%.|
[2a17 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[2a18 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e f2 27 95 b3 ce 6a 1a 44 83 62 |0E.!...'...j.D.b|
00000010 72 94 a6 ac 3d cc d3 13 9c aa ec 31 4b b1 be 28 |r...=......1K..(|
00000020 2c 53 15 ad d1 02 20 2d 5d 06 e1 48 43 32 03 c4 |,S.... -]..HC2..|
00000030 e6 ff 14 6d 51 c2 a4 b9 29 1f 8f a7 3b 82 e7 a9 |...mQ...)...;...|
00000040 0f 90 d8 9f 50 e7 38 |....P.8|
[2a19 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a1a 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a1b 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a1c 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[2a1d 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[2a1e 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[2a1f 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a20 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[2a21 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 3b ce 7c 78 dd 24 7d 14 83 b0 |0E.!..;.|x.$}...|
00000010 01 7c 7c 5c 54 47 53 e3 99 76 64 6c 1c 6d 48 82 |.||\TGS..vdl.mH.|
00000020 71 fe a5 b5 ed 02 20 3e 58 62 7c c4 d2 7f 39 8a |q..... >Xb|...9.|
00000030 b2 da 2c 73 a2 45 c6 70 68 9f fb a9 1f ef 36 51 |..,s.E.ph.....6Q|
00000040 77 1b c1 64 60 f0 3d |w..d`.=|
[2a22 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2a23 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2a24 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a25 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a26 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a27 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[2a28 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a29 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[2a2a 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[2a2b 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a2c 02-22 00:14:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2a2d 02-22 00:14:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2a2e 02-22 00:14:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2a2f 02-22 00:14:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2a30 02-22 00:14:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2a31 02-22 00:14:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2a32 02-22 00:14:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 15 e9 5b 4b 8a dc 6a d9 49 5f 44 ed 9a a3 f7 |...[K..j.I_D....|
00000010 ee 0c 3d 4f 65 ec 7d eb 26 9e 9b 09 84 65 24 f4 |..=Oe.}.&....e$.|
[2a33 02-22 00:14:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 17 91 a4 11 ec 27 f8 9f 96 82 21 |0D. V.....'....!|
00000010 3e ad 25 ce e6 41 9e 2e 41 6d 38 cf ab 4b 06 35 |>.%..A..Am8..K.5|
00000020 df ab e0 e6 02 20 6f 7f c7 44 0f fc 65 4e 32 6b |..... o..D..eN2k|
00000030 75 30 3a 2f 23 a3 4d 7e bf 2f ae 04 79 f9 18 8f |u0:/#.M~./..y...|
00000040 3c 0b 3a f2 5c 63 |<.:.\c|
[2a34 02-22 00:14:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2a35 02-22 00:14:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffc510 gate 1582330478563959600 evaluation starts
[2a36 02-22 00:14:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffc510 signed by 0 principal evaluation starts (used [false])
[2a37 02-22 00:14:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffc510 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2a38 02-22 00:14:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffc510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2a39 02-22 00:14:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffc510 principal evaluation fails
[2a3a 02-22 00:14:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffc510 gate 1582330478563959600 evaluation fails
[2a3b 02-22 00:14:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2a3c 02-22 00:14:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2a3d 02-22 00:14:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2a3e 02-22 00:14:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 15 e9 5b 4b 8a dc 6a d9 49 5f 44 ed 9a a3 f7 |...[K..j.I_D....|
00000010 ee 0c 3d 4f 65 ec 7d eb 26 9e 9b 09 84 65 24 f4 |..=Oe.}.&....e$.|
[2a3f 02-22 00:14:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 17 91 a4 11 ec 27 f8 9f 96 82 21 |0D. V.....'....!|
00000010 3e ad 25 ce e6 41 9e 2e 41 6d 38 cf ab 4b 06 35 |>.%..A..Am8..K.5|
00000020 df ab e0 e6 02 20 6f 7f c7 44 0f fc 65 4e 32 6b |..... o..D..eN2k|
00000030 75 30 3a 2f 23 a3 4d 7e bf 2f ae 04 79 f9 18 8f |u0:/#.M~./..y...|
00000040 3c 0b 3a f2 5c 63 |<.:.\c|
[2a40 02-22 00:14:38.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[2a41 02-22 00:14:38.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2a42 02-22 00:14:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffd090 gate 1582330478591083200 evaluation starts
[2a43 02-22 00:14:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffd090 signed by 0 principal evaluation starts (used [false])
[2a44 02-22 00:14:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffd090 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2a45 02-22 00:14:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffd090 principal evaluation succeeds for identity 0
[2a46 02-22 00:14:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffd090 gate 1582330478591083200 evaluation succeeds
[2a47 02-22 00:14:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2a48 02-22 00:14:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2a49 02-22 00:14:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2a4a 02-22 00:14:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2a4b 02-22 00:14:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes
[2a4c 02-22 00:14:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a4d 02-22 00:14:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[2a4e 02-22 00:14:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 cc 9a db c0 49 81 0a f6 d4 04 16 70 39 41 39 |.....I......p9A9|
00000010 24 f1 9d 41 08 a9 93 47 aa b6 41 bc b4 08 25 b2 |$..A...G..A...%.|
[2a4f 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e f2 27 95 b3 ce 6a 1a 44 83 62 |0E.!...'...j.D.b|
00000010 72 94 a6 ac 3d cc d3 13 9c aa ec 31 4b b1 be 28 |r...=......1K..(|
00000020 2c 53 15 ad d1 02 20 2d 5d 06 e1 48 43 32 03 c4 |,S.... -]..HC2..|
00000030 e6 ff 14 6d 51 c2 a4 b9 29 1f 8f a7 3b 82 e7 a9 |...mQ...)...;...|
00000040 0f 90 d8 9f 50 e7 38 |....P.8|
[2a50 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[2a51 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[2a52 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a53 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2a54 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 72 b1 a9 30 40 1c ff be bc a3 95 c6 92 ec e0 |.r..0@..........|
00000010 d8 b5 3b e1 7e f3 aa 5f 65 15 6d 33 f4 c3 b1 98 |..;.~.._e.m3....|
[2a55 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 d2 01 45 da 6c da a4 15 8e ec |0E.!....E.l.....|
00000010 4c 74 16 16 fe be 6d 1b 2d 49 68 4c 35 14 86 08 |Lt....m.-IhL5...|
00000020 f1 62 96 11 73 02 20 17 02 13 c5 d3 45 75 fb 9e |.b..s. .....Eu..|
00000030 27 6c 47 96 ee 64 55 06 aa 12 22 e6 b7 61 d4 ca |'lG..dU..."..a..|
00000040 a1 fe 06 3c 3c 0f d2 |...<<..|
[2a56 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2a57 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a58 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a59 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[2a5a 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2a5b 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 72 b1 a9 30 40 1c ff be bc a3 95 c6 92 ec e0 |.r..0@..........|
00000010 d8 b5 3b e1 7e f3 aa 5f 65 15 6d 33 f4 c3 b1 98 |..;.~.._e.m3....|
[2a5c 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 d2 01 45 da 6c da a4 15 8e ec |0E.!....E.l.....|
00000010 4c 74 16 16 fe be 6d 1b 2d 49 68 4c 35 14 86 08 |Lt....m.-IhL5...|
00000020 f1 62 96 11 73 02 20 17 02 13 c5 d3 45 75 fb 9e |.b..s. .....Eu..|
00000030 27 6c 47 96 ee 64 55 06 aa 12 22 e6 b7 61 d4 ca |'lG..dU..."..a..|
00000040 a1 fe 06 3c 3c 0f d2 |...<<..|
[2a5d 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2a5e 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a5f 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[2a60 02-22 00:14:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a61 02-22 00:14:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a62 02-22 00:14:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2a63 02-22 00:14:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2a64 02-22 00:14:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2a65 02-22 00:14:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2a66 02-22 00:14:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2a67 02-22 00:14:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2a68 02-22 00:14:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 fd 3a 19 42 63 55 53 12 00 da cf ca 09 aa cd |F.:.BcUS........|
00000010 df e1 2f 8d 11 df 40 c7 ba 66 59 63 56 d9 9f 45 |../...@..fYcV..E|
[2a69 02-22 00:14:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 b8 57 fd e6 16 37 39 7e 84 5b 6e |0D. ..W...79~.[n|
00000010 f4 a7 b0 c9 dd 88 a6 0d 7a 34 82 12 bb d2 3b 03 |........z4....;.|
00000020 3a f8 4b b7 02 20 5a 25 5c 91 06 34 e3 6c 6c 8a |:.K.. Z%\..4.ll.|
00000030 51 3e a2 68 65 90 50 36 2f a0 37 c5 9a 4f 62 4c |Q>.he.P6/.7..ObL|
00000040 3e 6a dd 3f 0d 19 |>j.?..|
[2a6a 02-22 00:14:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2a6b 02-22 00:14:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00629f290 gate 1582330478616174600 evaluation starts
[2a6c 02-22 00:14:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00629f290 signed by 0 principal evaluation starts (used [false])
[2a6d 02-22 00:14:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00629f290 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2a6e 02-22 00:14:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00629f290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2a6f 02-22 00:14:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00629f290 principal evaluation fails
[2a70 02-22 00:14:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00629f290 gate 1582330478616174600 evaluation fails
[2a71 02-22 00:14:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2a72 02-22 00:14:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2a73 02-22 00:14:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2a74 02-22 00:14:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 fd 3a 19 42 63 55 53 12 00 da cf ca 09 aa cd |F.:.BcUS........|
00000010 df e1 2f 8d 11 df 40 c7 ba 66 59 63 56 d9 9f 45 |../...@..fYcV..E|
[2a75 02-22 00:14:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 b8 57 fd e6 16 37 39 7e 84 5b 6e |0D. ..W...79~.[n|
00000010 f4 a7 b0 c9 dd 88 a6 0d 7a 34 82 12 bb d2 3b 03 |........z4....;.|
00000020 3a f8 4b b7 02 20 5a 25 5c 91 06 34 e3 6c 6c 8a |:.K.. Z%\..4.ll.|
00000030 51 3e a2 68 65 90 50 36 2f a0 37 c5 9a 4f 62 4c |Q>.he.P6/.7..ObL|
00000040 3e 6a dd 3f 0d 19 |>j.?..|
[2a76 02-22 00:14:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2a77 02-22 00:14:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00629fb90 gate 1582330478627302500 evaluation starts
[2a78 02-22 00:14:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00629fb90 signed by 0 principal evaluation starts (used [false])
[2a79 02-22 00:14:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00629fb90 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2a7a 02-22 00:14:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00629fb90 principal evaluation succeeds for identity 0
[2a7b 02-22 00:14:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00629fb90 gate 1582330478627302500 evaluation succeeds
[2a7c 02-22 00:14:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2a7d 02-22 00:14:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2a7e 02-22 00:14:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2a7f 02-22 00:14:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2a80 02-22 00:14:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes
[2a81 02-22 00:14:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a82 02-22 00:14:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[2a83 02-22 00:14:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 cc 9a db c0 49 81 0a f6 d4 04 16 70 39 41 39 |.....I......p9A9|
00000010 24 f1 9d 41 08 a9 93 47 aa b6 41 bc b4 08 25 b2 |$..A...G..A...%.|
[2a84 02-22 00:14:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e f2 27 95 b3 ce 6a 1a 44 83 62 |0E.!...'...j.D.b|
00000010 72 94 a6 ac 3d cc d3 13 9c aa ec 31 4b b1 be 28 |r...=......1K..(|
00000020 2c 53 15 ad d1 02 20 2d 5d 06 e1 48 43 32 03 c4 |,S.... -]..HC2..|
00000030 e6 ff 14 6d 51 c2 a4 b9 29 1f 8f a7 3b 82 e7 a9 |...mQ...)...;...|
00000040 0f 90 d8 9f 50 e7 38 |....P.8|
[2a85 02-22 00:14:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[2a86 02-22 00:14:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes
[2a87 02-22 00:14:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a88 02-22 00:14:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a89 02-22 00:14:39.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a8a 02-22 00:14:39.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a8b 02-22 00:14:39.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[2a8c 02-22 00:14:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[2a8d 02-22 00:14:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a8e 02-22 00:14:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[2a8f 02-22 00:14:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a90 02-22 00:14:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[2a91 02-22 00:14:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2a92 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[2a93 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[2a94 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[2a95 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[2a96 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[2a97 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a98 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2a99 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2a9a 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2a9b 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2a9c 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2a9d 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2a9e 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2a9f 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2aa0 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2aa1 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2aa2 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630d3e0 gate 1582330479106581400 evaluation starts
[2aa3 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[2aa4 02-22 00:14:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630d3e0 signed by 0 principal evaluation starts (used [false])
[2aa5 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630d3e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2aa6 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630d3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2aa7 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630d3e0 principal evaluation fails
[2aa8 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630d3e0 gate 1582330479106581400 evaluation fails
[2aa9 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2aaa 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2aab 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2aac 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2aad 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2aae 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2aaf 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630dcf0 gate 1582330479118615300 evaluation starts
[2ab0 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630dcf0 signed by 0 principal evaluation starts (used [false])
[2ab1 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630dcf0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2ab2 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630dcf0 principal evaluation succeeds for identity 0
[2ab3 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630dcf0 gate 1582330479118615300 evaluation succeeds
[2ab4 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2ab5 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2ab6 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2ab7 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2ab8 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ab9 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2aba 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2abb 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2abc 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2abd 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2abe 02-22 00:14:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2abf 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2ac0 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[2ac1 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2ac2 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2ac3 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00634f760 gate 1582330479120406800 evaluation starts
[2ac4 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00634f760 signed by 0 principal evaluation starts (used [false])
[2ac5 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00634f760 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2ac6 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00634f760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2ac7 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00634f760 principal evaluation fails
[2ac8 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00634f760 gate 1582330479120406800 evaluation fails
[2ac9 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2aca 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2acb 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2acc 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[2acd 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2ace 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2acf 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064cc060 gate 1582330479127384500 evaluation starts
[2ad0 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064cc060 signed by 0 principal evaluation starts (used [false])
[2ad1 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064cc060 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2ad2 02-22 00:14:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064cc060 principal evaluation succeeds for identity 0
[2ad3 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0064cc060 gate 1582330479127384500 evaluation succeeds
[2ad4 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2ad5 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2ad6 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2ad7 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2ad8 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ad9 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[2ada 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2adb 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2adc 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2add 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2ade 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2adf 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2ae0 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2ae1 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2ae2 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2ae3 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2ae4 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2ae5 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2ae6 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00650d680 gate 1582330479138556200 evaluation starts
[2ae7 02-22 00:14:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00650d680 signed by 0 principal evaluation starts (used [false])
[2ae8 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00650d680 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2ae9 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00650d680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2aea 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00650d680 principal evaluation fails
[2aeb 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00650d680 gate 1582330479138556200 evaluation fails
[2aec 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2aed 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2aee 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2aef 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2af0 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2af1 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2af2 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa01f0 gate 1582330479146327900 evaluation starts
[2af3 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa01f0 signed by 0 principal evaluation starts (used [false])
[2af4 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa01f0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2af5 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa01f0 principal evaluation succeeds for identity 0
[2af6 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa01f0 gate 1582330479146327900 evaluation succeeds
[2af7 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2af8 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2af9 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2afa 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2afb 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[2afc 02-22 00:14:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[2afd 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[2afe 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[2aff 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b00 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b01 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2b02 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2b03 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2b04 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2b05 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2b06 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2b07 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[2b08 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2b09 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2b0a 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b0b 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb4c90 gate 1582330479158709600 evaluation starts
[2b0c 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b0d 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[2b0f 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b10 02-22 00:14:39.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b11 02-22 00:14:39.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9350904755879940471 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[2b12 02-22 00:14:39.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9350904755879940471 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[2b0e 02-22 00:14:39.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb4c90 signed by 0 principal evaluation starts (used [false])
[2b13 02-22 00:14:39.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b14 02-22 00:14:39.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb4c90 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2b15 02-22 00:14:39.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb4c90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2b16 02-22 00:14:39.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb4c90 principal evaluation fails
[2b17 02-22 00:14:39.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb4c90 gate 1582330479158709600 evaluation fails
[2b18 02-22 00:14:39.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2b19 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2b1a 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2b1b 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[2b1c 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2b1d 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2b1e 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb55a0 gate 1582330479171700400 evaluation starts
[2b1f 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb55a0 signed by 0 principal evaluation starts (used [false])
[2b20 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb55a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2b21 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb55a0 principal evaluation succeeds for identity 0
[2b22 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb55a0 gate 1582330479171700400 evaluation succeeds
[2b23 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2b24 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2b25 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2b26 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2b27 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b28 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[2b29 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b2a 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b2b 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b2c 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2b2d 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2b2e 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2b2f 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2b30 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2b31 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2b32 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[2b33 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2b34 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2b35 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc92b0 gate 1582330479178754300 evaluation starts
[2b36 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc92b0 signed by 0 principal evaluation starts (used [false])
[2b37 02-22 00:14:39.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc92b0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2b38 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc92b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2b39 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc92b0 principal evaluation fails
[2b3a 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc92b0 gate 1582330479178754300 evaluation fails
[2b3b 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2b3c 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2b3d 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2b3e 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[2b3f 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2b40 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2b41 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc9bb0 gate 1582330479182702300 evaluation starts
[2b42 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc9bb0 signed by 0 principal evaluation starts (used [false])
[2b43 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc9bb0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2b44 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc9bb0 principal evaluation succeeds for identity 0
[2b45 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc9bb0 gate 1582330479182702300 evaluation succeeds
[2b46 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2b47 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2b48 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2b49 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2b4a 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[2b4b 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[2b4c 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b4d 02-22 00:14:39.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b4e 02-22 00:14:39.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2b4f 02-22 00:14:39.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2b50 02-22 00:14:39.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2b51 02-22 00:14:39.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2b52 02-22 00:14:39.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2b53 02-22 00:14:39.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2b54 02-22 00:14:39.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2b55 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2b56 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2b57 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9cc0 gate 1582330479202106600 evaluation starts
[2b58 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9cc0 signed by 0 principal evaluation starts (used [false])
[2b59 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9cc0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2b5a 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2b5b 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9cc0 principal evaluation fails
[2b5c 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9cc0 gate 1582330479202106600 evaluation fails
[2b5d 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2b5e 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2b5f 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2b60 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2b61 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2b62 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2b63 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fee5c0 gate 1582330479204502900 evaluation starts
[2b64 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fee5c0 signed by 0 principal evaluation starts (used [false])
[2b65 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fee5c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2b66 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fee5c0 principal evaluation succeeds for identity 0
[2b67 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fee5c0 gate 1582330479204502900 evaluation succeeds
[2b68 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2b69 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2b6a 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2b6b 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2b6c 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[2b6d 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[2b6e 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b6f 02-22 00:14:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9350904755879940471 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[2b70 02-22 00:14:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9350904755879940471 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[2b71 02-22 00:14:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b72 02-22 00:14:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2b73 02-22 00:14:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b74 02-22 00:14:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2b75 02-22 00:14:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2b76 02-22 00:14:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 1d 4a 4d fc 9b 31 e2 7e 1e f9 a9 88 d4 29 b1 |..JM..1.~.....).|
00000010 a6 88 d6 d0 49 7d a6 b6 35 50 e8 31 46 c9 33 df |....I}..5P.1F.3.|
[2b77 02-22 00:14:39.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 64 a6 ca 78 a0 0d f1 4f a6 d9 95 |0D. @d..x...O...|
00000010 67 42 8e ad b6 89 8f 19 60 8e fe 13 99 20 be 8c |gB......`.... ..|
00000020 54 23 11 11 02 20 5f a4 90 fe b7 e0 2e 51 67 c1 |T#... _......Qg.|
00000030 43 b2 1a 87 5f be 3d 68 94 b8 a0 77 c2 8d 81 5e |C..._.=h...w...^|
00000040 0f d1 9f bb 92 e2 |......|
[2b78 02-22 00:14:39.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[2b79 02-22 00:14:39.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 07 77 34 96 36 4b 22 28 0a fb 87 |0D. @.w4.6K"(...|
00000010 9f b9 43 22 9b 2c b9 78 88 0c b2 17 2a 74 57 8f |..C".,.x....*tW.|
00000020 c0 c9 c6 21 02 20 4b c8 d4 08 86 92 7a e8 bf 73 |...!. K.....z..s|
00000030 c6 ff c7 b2 dd 01 b0 07 20 a2 23 b0 f1 84 c1 66 |........ .#....f|
00000040 71 22 ee ed e7 c9 |q"....|
[2b7a 02-22 00:14:39.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2b7b 02-22 00:14:39.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[2b7c 02-22 00:14:39.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:43
[2b7d 02-22 00:14:39.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:43
[2b7e 02-22 00:14:39.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[2b7f 02-22 00:14:39.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b80 02-22 00:14:39.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b81 02-22 00:14:39.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b82 02-22 00:14:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b83 02-22 00:14:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b84 02-22 00:14:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b85 02-22 00:14:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2b86 02-22 00:14:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b87 02-22 00:14:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes
[2b88 02-22 00:14:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b89 02-22 00:14:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2b8a 02-22 00:14:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes
[2b8b 02-22 00:14:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b8c 02-22 00:14:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes
[2b8d 02-22 00:14:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b8e 02-22 00:14:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes
[2b8f 02-22 00:14:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b90 02-22 00:14:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2b91 02-22 00:14:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2b92 02-22 00:14:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2b93 02-22 00:14:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2b94 02-22 00:14:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[2b95 02-22 00:14:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2b96 02-22 00:14:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2b97 02-22 00:14:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2b98 02-22 00:14:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2b99 02-22 00:14:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2b9a 02-22 00:14:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2b9b 02-22 00:14:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2b9c 02-22 00:14:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 a3 3d 7e 06 22 7f 73 f8 b0 1d bb 21 39 f8 89 |$.=~.".s....!9..|
00000010 1a e5 30 9f 84 e9 d1 09 30 04 95 d4 2d e2 2e e5 |..0.....0...-...|
[2b9d 02-22 00:14:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 2a 23 67 28 06 ca 8d 37 81 eb 57 |0D. .*#g(...7..W|
00000010 a3 d6 e6 9e 13 87 a8 d8 80 a8 fe b7 bf a1 79 4b |..............yK|
00000020 ba 6d 5f d8 02 20 6b 32 21 22 29 69 ba 4c bd bf |.m_.. k2!")i.L..|
00000030 c7 40 ca d9 d2 49 10 b1 39 e4 88 e8 65 0c fc 0b |.@...I..9...e...|
00000040 dc bd 7a 9f 93 90 |..z...|
[2b9e 02-22 00:14:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2b9f 02-22 00:14:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030431d0 gate 1582330479310214200 evaluation starts
[2ba0 02-22 00:14:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030431d0 signed by 0 principal evaluation starts (used [false])
[2ba1 02-22 00:14:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030431d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2ba2 02-22 00:14:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030431d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2ba3 02-22 00:14:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030431d0 principal evaluation fails
[2ba4 02-22 00:14:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030431d0 gate 1582330479310214200 evaluation fails
[2ba5 02-22 00:14:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2ba6 02-22 00:14:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2ba7 02-22 00:14:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2ba8 02-22 00:14:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 a3 3d 7e 06 22 7f 73 f8 b0 1d bb 21 39 f8 89 |$.=~.".s....!9..|
00000010 1a e5 30 9f 84 e9 d1 09 30 04 95 d4 2d e2 2e e5 |..0.....0...-...|
[2ba9 02-22 00:14:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 2a 23 67 28 06 ca 8d 37 81 eb 57 |0D. .*#g(...7..W|
00000010 a3 d6 e6 9e 13 87 a8 d8 80 a8 fe b7 bf a1 79 4b |..............yK|
00000020 ba 6d 5f d8 02 20 6b 32 21 22 29 69 ba 4c bd bf |.m_.. k2!")i.L..|
00000030 c7 40 ca d9 d2 49 10 b1 39 e4 88 e8 65 0c fc 0b |.@...I..9...e...|
00000040 dc bd 7a 9f 93 90 |..z...|
[2baa 02-22 00:14:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2bab 02-22 00:14:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003043ad0 gate 1582330479317300300 evaluation starts
[2bac 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003043ad0 signed by 0 principal evaluation starts (used [false])
[2bad 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2bae 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003043ad0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2baf 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003043ad0 principal evaluation succeeds for identity 0
[2bb0 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003043ad0 gate 1582330479317300300 evaluation succeeds
[2bb1 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2bb2 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2bb3 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2bb4 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2bb5 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2bb6 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes]}
[2bb7 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:42
[2bb8 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:42
[2bb9 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[2bba 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bbb 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bbc 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bbd 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2bbe 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bbf 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bc0 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2bc1 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bc2 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2bc3 02-22 00:14:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bc4 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes
[2bc5 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes
[2bc6 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bc7 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes
[2bc8 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bc9 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bca 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bcb 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bcc 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bcd 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bce 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bcf 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2bd0 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bd1 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bd2 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2bd4 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2bd3 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[2bd5 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bd6 02-22 00:14:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bd7 02-22 00:14:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[2bd8 02-22 00:14:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[2bd9 02-22 00:14:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA15100C1801
[2bda 02-22 00:14:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DB29904FC0DD43C2E8CF79DEDD3ED6549CD2DDC859B1F5B57C739C65390A6391
[2bdb 02-22 00:14:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[2bdc 02-22 00:14:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bdd 02-22 00:14:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bde 02-22 00:14:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bdf 02-22 00:14:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2be0 02-22 00:14:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[2be1 02-22 00:14:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2be2 02-22 00:14:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2be3 02-22 00:14:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[2be4 02-22 00:14:39.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2be5 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151027
[2be6 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3916D8CC8FE9AC5E88D3E3CF63466A599D14CEC15D7D713DAFC5F94314AD1922
[2be7 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[2be8 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[2be9 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[2bea 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2beb 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bec 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[2bed 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bee 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2bef 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bf0 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2bf1 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes
[2bf2 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bf3 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2bf4 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bf5 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes
[2bf6 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bf7 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:40 , Envelope: 83 bytes, Signature: 69 bytes
[2bf8 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2bf9 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:40 , Envelope: 83 bytes, Signature: 69 bytes
[2bfa 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[2bfb 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2bfc 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2bfd 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2bfe 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2bff 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2c00 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2c01 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2c02 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 7d 6c 47 7f 80 20 f0 90 ef c3 34 d8 90 c3 ea |_}lG.. ....4....|
00000010 c4 89 86 f3 3e 21 62 76 40 aa 68 7d fa d1 7f f0 |....>!bv@.h}....|
[2c03 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 02 39 63 b9 ea 51 e9 6c 59 80 af de |0C. .9c..Q.lY...|
00000010 81 d5 a8 d7 03 b3 72 69 91 90 fb 35 ba 42 3e 0b |......ri...5.B>.|
00000020 97 88 b3 19 02 1f 74 59 4e 47 71 97 65 14 88 10 |......tYNGq.e...|
00000030 b6 7c a3 dc 5e bd e8 f3 b4 76 10 10 0e 53 66 cf |.|..^....v...Sf.|
00000040 74 b6 cc b2 ff |t....|
[2c04 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2c05 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030b26c0 gate 1582330479779574200 evaluation starts
[2c06 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030b26c0 signed by 0 principal evaluation starts (used [false])
[2c07 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030b26c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2c08 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030b26c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2c09 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030b26c0 principal evaluation fails
[2c0a 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030b26c0 gate 1582330479779574200 evaluation fails
[2c0b 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2c0c 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2c0d 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2c0e 02-22 00:14:39.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 7d 6c 47 7f 80 20 f0 90 ef c3 34 d8 90 c3 ea |_}lG.. ....4....|
00000010 c4 89 86 f3 3e 21 62 76 40 aa 68 7d fa d1 7f f0 |....>!bv@.h}....|
[2c0f 02-22 00:14:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 02 39 63 b9 ea 51 e9 6c 59 80 af de |0C. .9c..Q.lY...|
00000010 81 d5 a8 d7 03 b3 72 69 91 90 fb 35 ba 42 3e 0b |......ri...5.B>.|
00000020 97 88 b3 19 02 1f 74 59 4e 47 71 97 65 14 88 10 |......tYNGq.e...|
00000030 b6 7c a3 dc 5e bd e8 f3 b4 76 10 10 0e 53 66 cf |.|..^....v...Sf.|
00000040 74 b6 cc b2 ff |t....|
[2c10 02-22 00:14:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2c11 02-22 00:14:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030b2fc0 gate 1582330479780169000 evaluation starts
[2c12 02-22 00:14:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030b2fc0 signed by 0 principal evaluation starts (used [false])
[2c13 02-22 00:14:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030b2fc0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2c14 02-22 00:14:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030b2fc0 principal evaluation succeeds for identity 0
[2c15 02-22 00:14:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030b2fc0 gate 1582330479780169000 evaluation succeeds
[2c16 02-22 00:14:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2c17 02-22 00:14:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2c18 02-22 00:14:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2c19 02-22 00:14:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2c1a 02-22 00:14:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:40 , Envelope: 83 bytes, Signature: 69 bytes
[2c1b 02-22 00:14:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:40 , Envelope: 83 bytes, Signature: 69 bytes]}
[2c1c 02-22 00:14:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:40
[2c1d 02-22 00:14:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:40
[2c1e 02-22 00:14:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[2c1f 02-22 00:14:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c20 02-22 00:14:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c21 02-22 00:14:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c22 02-22 00:14:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c23 02-22 00:14:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c24 02-22 00:14:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c25 02-22 00:14:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c26 02-22 00:14:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c27 02-22 00:14:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c28 02-22 00:14:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:40 , Envelope: 83 bytes, Signature: 69 bytes to 1 peers
[2c29 02-22 00:14:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c2a 02-22 00:14:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c2b 02-22 00:14:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:40 , Envelope: 83 bytes, Signature: 69 bytes
[2c2c 02-22 00:14:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c2d 02-22 00:14:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:40 , Envelope: 83 bytes, Signature: 69 bytes to 1 peers
[2c2e 02-22 00:14:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:40 , Envelope: 83 bytes, Signature: 69 bytes
[2c2f 02-22 00:14:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c30 02-22 00:14:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:40 , Envelope: 83 bytes, Signature: 69 bytes
[2c31 02-22 00:14:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:40 , Envelope: 83 bytes, Signature: 69 bytes
[2c32 02-22 00:14:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c33 02-22 00:14:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:40 , Envelope: 83 bytes, Signature: 69 bytes
[2c34 02-22 00:14:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c35 02-22 00:14:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3001011902431056116 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[2c36 02-22 00:14:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3001011902431056116 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[2c37 02-22 00:14:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[2c38 02-22 00:14:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c39 02-22 00:14:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[2c3a 02-22 00:14:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c3b 02-22 00:14:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c3c 02-22 00:14:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c3d 02-22 00:14:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes
[2c3e 02-22 00:14:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes
[2c3f 02-22 00:14:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c40 02-22 00:14:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes
[2c41 02-22 00:14:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[2c42 02-22 00:14:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 16 d8 cc 8f e9 ac 5e 88 d3 e3 cf 63 46 6a 59 |9......^....cFjY|
00000010 9d 14 ce c1 5d 7d 71 3d af c5 f9 43 14 ad 19 22 |....]}q=...C..."|
[2c43 02-22 00:14:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f b9 0c 37 8a 8e fb 38 0a ba f1 13 |0D. O..7...8....|
00000010 3b 33 81 12 db c1 ee 4d a6 b0 28 74 cc 4c 69 36 |;3.....M..(t.Li6|
00000020 ad 1a 5c 1b 02 20 7e 3a b0 24 6e 12 b1 8d c4 b9 |..\.. ~:.$n.....|
00000030 63 48 90 6b 18 e2 21 72 5f 1a eb 24 f9 c1 f8 f5 |cH.k..!r_..$....|
00000040 59 d2 6d 47 2f 30 |Y.mG/0|
[2c44 02-22 00:14:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes
[2c45 02-22 00:14:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c46 02-22 00:14:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:40 , Envelope: 83 bytes, Signature: 69 bytes
[2c47 02-22 00:14:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c48 02-22 00:14:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:40 , Envelope: 83 bytes, Signature: 69 bytes
[2c49 02-22 00:14:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c4a 02-22 00:14:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes
[2c4b 02-22 00:14:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c4c 02-22 00:14:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes
[2c4d 02-22 00:14:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[2c4e 02-22 00:14:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 16 d8 cc 8f e9 ac 5e 88 d3 e3 cf 63 46 6a 59 |9......^....cFjY|
00000010 9d 14 ce c1 5d 7d 71 3d af c5 f9 43 14 ad 19 22 |....]}q=...C..."|
[2c4f 02-22 00:14:39.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f b9 0c 37 8a 8e fb 38 0a ba f1 13 |0D. O..7...8....|
00000010 3b 33 81 12 db c1 ee 4d a6 b0 28 74 cc 4c 69 36 |;3.....M..(t.Li6|
00000020 ad 1a 5c 1b 02 20 7e 3a b0 24 6e 12 b1 8d c4 b9 |..\.. ~:.$n.....|
00000030 63 48 90 6b 18 e2 21 72 5f 1a eb 24 f9 c1 f8 f5 |cH.k..!r_..$....|
00000040 59 d2 6d 47 2f 30 |Y.mG/0|
[2c50 02-22 00:14:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes
[2c51 02-22 00:14:39.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c52 02-22 00:14:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[2c53 02-22 00:14:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c54 02-22 00:14:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c55 02-22 00:14:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c56 02-22 00:14:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c57 02-22 00:14:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[2c58 02-22 00:14:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[2c59 02-22 00:14:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c5a 02-22 00:14:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c5b 02-22 00:14:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c5c 02-22 00:14:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c5d 02-22 00:14:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:3705539149281627569 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2c5e 02-22 00:14:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:3705539149281627569 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2c5f 02-22 00:14:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c60 02-22 00:14:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c61 02-22 00:14:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c62 02-22 00:14:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c63 02-22 00:14:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c64 02-22 00:14:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c65 02-22 00:14:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[2c66 02-22 00:14:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c67 02-22 00:14:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[2c68 02-22 00:14:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c69 02-22 00:14:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[2c6a 02-22 00:14:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2c6b 02-22 00:14:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 e1 6e a0 49 fe e2 6f 77 b6 91 67 ba ba 40 ea |..n.I..ow..g..@.|
00000010 41 f1 76 dc 3c 1b c8 01 b7 c2 f3 aa f6 b1 24 d0 |A.v.<.........$.|
[2c6c 02-22 00:14:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 6c e4 e5 12 f4 05 4e 7c cd 88 ec |0D. *l.....N|...|
00000010 de e8 84 7c 7b 82 fb 1e a1 d6 f7 c4 d1 a5 3d dc |...|{.........=.|
00000020 87 49 db 23 02 20 3c d7 56 86 9b 6e af a1 20 66 |.I.#. <.V..n.. f|
00000030 93 99 ef df 24 83 80 95 40 60 3a 97 5b 8b 03 0a |....$...@`:.[...|
00000040 06 7d 52 7a 95 74 |.}Rz.t|
[2c6d 02-22 00:14:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[2c6e 02-22 00:14:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 af d6 6a b3 4c 51 c0 7f 74 a2 |0E.!....j.LQ..t.|
00000010 58 e2 c2 6b 54 77 cf 77 6f bf e5 c9 53 ff de b9 |X..kTw.wo...S...|
00000020 b6 6c a9 89 e2 02 20 30 a3 8c 55 e2 d1 e5 2a cf |.l.... 0..U...*.|
00000030 58 1b af f7 28 2f 53 5a 3c 21 74 c0 13 d8 40 fc |X...(/SZ<!t...@.|
00000040 50 ec cd 16 1d 5f 59 |P...._Y|
[2c6f 02-22 00:14:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2c70 02-22 00:14:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[2c71 02-22 00:14:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:44
[2c72 02-22 00:14:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:44
[2c73 02-22 00:14:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[2c74 02-22 00:14:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c75 02-22 00:14:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c76 02-22 00:14:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c77 02-22 00:14:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[2c78 02-22 00:14:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c79 02-22 00:14:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c7a 02-22 00:14:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[2c7b 02-22 00:14:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[2c7c 02-22 00:14:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[2c7d 02-22 00:14:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c7e 02-22 00:14:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:4247286445153288761 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2c7f 02-22 00:14:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:4247286445153288761 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2c80 02-22 00:14:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[2c81 02-22 00:14:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c82 02-22 00:14:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:8023612968646838032 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2c83 02-22 00:14:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:8023612968646838032 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2c84 02-22 00:14:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:8023612968646838032 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2c85 02-22 00:14:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c86 02-22 00:14:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c87 02-22 00:14:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c88 02-22 00:14:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c89 02-22 00:14:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c8a 02-22 00:14:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2c8b 02-22 00:14:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[2c8c 02-22 00:14:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c8d 02-22 00:14:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[2c8e 02-22 00:14:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7691889010845159524 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[2c8f 02-22 00:14:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[2c90 02-22 00:14:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7691889010845159524 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2c92 02-22 00:14:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c91 02-22 00:14:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:12428718066892659952 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[2c93 02-22 00:14:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[2c94 02-22 00:14:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1332642185323776500 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[2c95 02-22 00:14:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:12428718066892659952 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2c96 02-22 00:14:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c97 02-22 00:14:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1332642185323776500 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2c98 02-22 00:14:42.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7691889010845159524 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[2c99 02-22 00:14:42.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7691889010845159524 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[2c9a 02-22 00:14:42.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c9b 02-22 00:14:42.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2c9c 02-22 00:14:42.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12428718066892659952 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 154 bytes, Signature: 0 bytes
[2c9d 02-22 00:14:42.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12428718066892659952 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 154 bytes, Signature: 0 bytes
[2c9e 02-22 00:14:42.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12428718066892659952 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 154 bytes, Signature: 0 bytes
[2c9f 02-22 00:14:42.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ca0 02-22 00:14:42.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1332642185323776500 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[2ca1 02-22 00:14:42.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1332642185323776500 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[2ca2 02-22 00:14:42.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ca3 02-22 00:14:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2ca4 02-22 00:14:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ca5 02-22 00:14:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2ca6 02-22 00:14:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[2ca7 02-22 00:14:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ca8 02-22 00:14:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2ca9 02-22 00:14:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2caa 02-22 00:14:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2cab 02-22 00:14:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2cac 02-22 00:14:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2cad 02-22 00:14:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2cae 02-22 00:14:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 18 a0 9f 86 e1 fc 10 41 29 7b bb 0a 45 24 45 |........A){..E$E|
00000010 c5 0c 59 a7 02 67 2a 08 0f 4d fe 37 c4 a2 5f 4b |..Y..g*..M.7.._K|
[2caf 02-22 00:14:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 69 89 cc dc 1a e5 61 b6 64 ad 1d |0D. {i.....a.d..|
00000010 40 40 e3 62 c8 52 10 7e 2d 30 b9 11 b6 4b 48 ba |@@.b.R.~-0...KH.|
00000020 b4 82 92 9c 02 20 05 16 1a b6 71 36 5b 29 f3 26 |..... ....q6[).&|
00000030 68 45 a4 de f2 5c e3 a0 fb 39 1c 39 e5 d6 9d 57 |hE...\...9.9...W|
00000040 05 5d 55 16 cb 53 |.]U..S|
[2cb0 02-22 00:14:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2cb1 02-22 00:14:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314aa30 gate 1582330482459956900 evaluation starts
[2cb2 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314aa30 signed by 0 principal evaluation starts (used [false])
[2cb3 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314aa30 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2cb4 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314aa30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2cb5 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314aa30 principal evaluation fails
[2cb6 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314aa30 gate 1582330482459956900 evaluation fails
[2cb7 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2cb8 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2cb9 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2cba 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 18 a0 9f 86 e1 fc 10 41 29 7b bb 0a 45 24 45 |........A){..E$E|
00000010 c5 0c 59 a7 02 67 2a 08 0f 4d fe 37 c4 a2 5f 4b |..Y..g*..M.7.._K|
[2cbb 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 69 89 cc dc 1a e5 61 b6 64 ad 1d |0D. {i.....a.d..|
00000010 40 40 e3 62 c8 52 10 7e 2d 30 b9 11 b6 4b 48 ba |@@.b.R.~-0...KH.|
00000020 b4 82 92 9c 02 20 05 16 1a b6 71 36 5b 29 f3 26 |..... ....q6[).&|
00000030 68 45 a4 de f2 5c e3 a0 fb 39 1c 39 e5 d6 9d 57 |hE...\...9.9...W|
00000040 05 5d 55 16 cb 53 |.]U..S|
[2cbc 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2cbd 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314b330 gate 1582330482462177500 evaluation starts
[2cbe 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314b330 signed by 0 principal evaluation starts (used [false])
[2cbf 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314b330 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2cc0 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314b330 principal evaluation succeeds for identity 0
[2cc1 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314b330 gate 1582330482462177500 evaluation succeeds
[2cc2 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2cc3 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2cc4 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2cc5 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2cc6 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes
[2cc7 02-22 00:14:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes]}
[2cc8 02-22 00:14:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:41
[2cc9 02-22 00:14:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:41
[2cca 02-22 00:14:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:40 , Envelope: 83 bytes, Signature: 69 bytes in aliveMembership
[2ccb 02-22 00:14:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ccc 02-22 00:14:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ccd 02-22 00:14:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[2cce 02-22 00:14:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ccf 02-22 00:14:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2cd0 02-22 00:14:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2cd1 02-22 00:14:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[2cd2 02-22 00:14:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[2cd3 02-22 00:14:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[2cd4 02-22 00:14:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2cd5 02-22 00:14:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2cd6 02-22 00:14:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2cd7 02-22 00:14:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2cd8 02-22 00:14:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2cd9 02-22 00:14:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2cda 02-22 00:14:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[2cdb 02-22 00:14:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2cdc 02-22 00:14:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2cde 02-22 00:14:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2cdd 02-22 00:14:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151028
[2ce0 02-22 00:14:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FFFC29947B33530A12F99A856AB565AB282DFDB2C4DFE3D3F88CC80DACAB7B2D
[2ce1 02-22 00:14:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[2ce2 02-22 00:14:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[2ce3 02-22 00:14:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ce4 02-22 00:14:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[2ce5 02-22 00:14:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ce6 02-22 00:14:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[2ce7 02-22 00:14:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[2ce8 02-22 00:14:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[2ce9 02-22 00:14:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2cea 02-22 00:14:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2ceb 02-22 00:14:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2cec 02-22 00:14:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2ced 02-22 00:14:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2cdf 02-22 00:14:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2cee 02-22 00:14:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2cef 02-22 00:14:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2cf0 02-22 00:14:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2cf1 02-22 00:14:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 9d c2 38 8a 98 3e e6 6c 7b 15 48 a5 88 0b 9f |(..8..>.l{.H....|
00000010 ff 61 13 8d 61 b0 64 03 b9 c5 68 47 b3 be ee 99 |.a..a.d...hG....|
[2cf2 02-22 00:14:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 7f f8 5f f8 08 60 97 d6 fe ee 96 |0D. @.._..`.....|
00000010 37 67 68 d8 fb 6a b5 8e eb 5d ac ad 8f c3 9e 2d |7gh..j...].....-|
00000020 11 27 b1 5a 02 20 50 90 81 91 2f 3b 57 b5 d2 b6 |.'.Z. P.../;W...|
00000030 65 62 f9 f4 cf 10 ed 00 cd 80 5d f1 70 ef 5c 31 |eb........].p.\1|
00000040 75 1a a6 f2 cf c4 |u.....|
[2cf3 02-22 00:14:42.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2cf4 02-22 00:14:42.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003165700 gate 1582330482523665200 evaluation starts
[2cf5 02-22 00:14:42.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003165700 signed by 0 principal evaluation starts (used [false])
[2cf6 02-22 00:14:42.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003165700 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2cf7 02-22 00:14:42.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003165700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2cf8 02-22 00:14:42.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003165700 principal evaluation fails
[2cf9 02-22 00:14:42.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003165700 gate 1582330482523665200 evaluation fails
[2cfa 02-22 00:14:42.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2cfb 02-22 00:14:42.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2cfc 02-22 00:14:42.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2cfd 02-22 00:14:42.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 9d c2 38 8a 98 3e e6 6c 7b 15 48 a5 88 0b 9f |(..8..>.l{.H....|
00000010 ff 61 13 8d 61 b0 64 03 b9 c5 68 47 b3 be ee 99 |.a..a.d...hG....|
[2cfe 02-22 00:14:42.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 7f f8 5f f8 08 60 97 d6 fe ee 96 |0D. @.._..`.....|
00000010 37 67 68 d8 fb 6a b5 8e eb 5d ac ad 8f c3 9e 2d |7gh..j...].....-|
00000020 11 27 b1 5a 02 20 50 90 81 91 2f 3b 57 b5 d2 b6 |.'.Z. P.../;W...|
00000030 65 62 f9 f4 cf 10 ed 00 cd 80 5d f1 70 ef 5c 31 |eb........].p.\1|
00000040 75 1a a6 f2 cf c4 |u.....|
[2cff 02-22 00:14:42.53 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2d00 02-22 00:14:42.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c2000 gate 1582330482534925400 evaluation starts
[2d01 02-22 00:14:42.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c2000 signed by 0 principal evaluation starts (used [false])
[2d03 02-22 00:14:42.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c2000 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2d04 02-22 00:14:42.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c2000 principal evaluation succeeds for identity 0
[2d02 02-22 00:14:42.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[2d05 02-22 00:14:42.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c2000 gate 1582330482534925400 evaluation succeeds
[2d06 02-22 00:14:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2d07 02-22 00:14:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2d08 02-22 00:14:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2d09 02-22 00:14:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2d0a 02-22 00:14:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes
[2d0b 02-22 00:14:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes]}
[2d0c 02-22 00:14:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:43
[2d0d 02-22 00:14:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:43
[2d0e 02-22 00:14:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[2d0f 02-22 00:14:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d10 02-22 00:14:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d11 02-22 00:14:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d12 02-22 00:14:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[2d15 02-22 00:14:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d16 02-22 00:14:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d17 02-22 00:14:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d13 02-22 00:14:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[2d14 02-22 00:14:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d18 02-22 00:14:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[2d1b 02-22 00:14:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[2d1c 02-22 00:14:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[2d1d 02-22 00:14:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d19 02-22 00:14:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[2d1e 02-22 00:14:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff fc 29 94 7b 33 53 0a 12 f9 9a 85 6a b5 65 ab |..).{3S.....j.e.|
00000010 28 2d fd b2 c4 df e3 d3 f8 8c c8 0d ac ab 7b 2d |(-............{-|
[2d1f 02-22 00:14:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 28 f0 f2 6b 29 2d d6 3a 70 6e 58 |0D. x(..k)-.:pnX|
00000010 6a 6b ae b0 52 be 04 cc 2b d7 82 24 61 3d fe e3 |jk..R...+..$a=..|
00000020 9b 59 b8 8b 02 20 26 6b 46 8d ef 86 a2 ea ff e9 |.Y... &kF.......|
00000030 b5 20 c3 06 58 55 51 da e0 bb 20 0b e1 44 ba f8 |. ..XUQ... ..D..|
00000040 c4 03 c1 f5 b9 8f |......|
[2d20 02-22 00:14:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[2d21 02-22 00:14:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 e2 8d a0 2a dd f5 1f 16 4f 1f |0E.!.....*....O.|
00000010 d7 02 fc c2 4b c6 88 10 ef 55 d6 5c af d4 5f b6 |....K....U.\.._.|
00000020 92 73 f7 18 aa 02 20 0d c4 4c 52 8a 48 93 a8 0c |.s.... ..LR.H...|
00000030 0e 4d 20 3b a3 13 19 95 4b fe b9 12 e8 92 74 97 |.M ;....K.....t.|
00000040 53 36 f1 fd 96 dc 8a |S6.....|
[2d22 02-22 00:14:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2d23 02-22 00:14:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2d24 02-22 00:14:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d25 02-22 00:14:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d1a 02-22 00:14:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes
[2d26 02-22 00:14:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d27 02-22 00:14:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[2d28 02-22 00:14:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes
[2d29 02-22 00:14:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2d2a 02-22 00:14:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[2d2b 02-22 00:14:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 e1 6e a0 49 fe e2 6f 77 b6 91 67 ba ba 40 ea |..n.I..ow..g..@.|
00000010 41 f1 76 dc 3c 1b c8 01 b7 c2 f3 aa f6 b1 24 d0 |A.v.<.........$.|
[2d2c 02-22 00:14:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 6c e4 e5 12 f4 05 4e 7c cd 88 ec |0D. *l.....N|...|
00000010 de e8 84 7c 7b 82 fb 1e a1 d6 f7 c4 d1 a5 3d dc |...|{.........=.|
00000020 87 49 db 23 02 20 3c d7 56 86 9b 6e af a1 20 66 |.I.#. <.V..n.. f|
00000030 93 99 ef df 24 83 80 95 40 60 3a 97 5b 8b 03 0a |....$...@`:.[...|
00000040 06 7d 52 7a 95 74 |.}Rz.t|
[2d2d 02-22 00:14:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes
[2d2e 02-22 00:14:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d2f 02-22 00:14:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[2d30 02-22 00:14:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d31 02-22 00:14:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2d32 02-22 00:14:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2d33 02-22 00:14:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2d34 02-22 00:14:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2d35 02-22 00:14:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2d36 02-22 00:14:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2d37 02-22 00:14:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 9d c2 38 8a 98 3e e6 6c 7b 15 48 a5 88 0b 9f |(..8..>.l{.H....|
00000010 ff 61 13 8d 61 b0 64 03 b9 c5 68 47 b3 be ee 99 |.a..a.d...hG....|
[2d38 02-22 00:14:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 7f f8 5f f8 08 60 97 d6 fe ee 96 |0D. @.._..`.....|
00000010 37 67 68 d8 fb 6a b5 8e eb 5d ac ad 8f c3 9e 2d |7gh..j...].....-|
00000020 11 27 b1 5a 02 20 50 90 81 91 2f 3b 57 b5 d2 b6 |.'.Z. P.../;W...|
00000030 65 62 f9 f4 cf 10 ed 00 cd 80 5d f1 70 ef 5c 31 |eb........].p.\1|
00000040 75 1a a6 f2 cf c4 |u.....|
[2d39 02-22 00:14:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2d3a 02-22 00:14:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242960 gate 1582330482586699000 evaluation starts
[2d3b 02-22 00:14:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242960 signed by 0 principal evaluation starts (used [false])
[2d3c 02-22 00:14:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242960 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2d3d 02-22 00:14:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2d3e 02-22 00:14:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242960 principal evaluation fails
[2d3f 02-22 00:14:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242960 gate 1582330482586699000 evaluation fails
[2d40 02-22 00:14:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2d41 02-22 00:14:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2d42 02-22 00:14:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2d43 02-22 00:14:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 9d c2 38 8a 98 3e e6 6c 7b 15 48 a5 88 0b 9f |(..8..>.l{.H....|
00000010 ff 61 13 8d 61 b0 64 03 b9 c5 68 47 b3 be ee 99 |.a..a.d...hG....|
[2d44 02-22 00:14:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 7f f8 5f f8 08 60 97 d6 fe ee 96 |0D. @.._..`.....|
00000010 37 67 68 d8 fb 6a b5 8e eb 5d ac ad 8f c3 9e 2d |7gh..j...].....-|
00000020 11 27 b1 5a 02 20 50 90 81 91 2f 3b 57 b5 d2 b6 |.'.Z. P.../;W...|
00000030 65 62 f9 f4 cf 10 ed 00 cd 80 5d f1 70 ef 5c 31 |eb........].p.\1|
00000040 75 1a a6 f2 cf c4 |u.....|
[2d45 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2d46 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243260 gate 1582330482590876300 evaluation starts
[2d47 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243260 signed by 0 principal evaluation starts (used [false])
[2d48 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243260 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2d49 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243260 principal evaluation succeeds for identity 0
[2d4a 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243260 gate 1582330482590876300 evaluation succeeds
[2d4b 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2d4c 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2d4d 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2d4e 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2d4f 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes
[2d50 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d51 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[2d52 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff fc 29 94 7b 33 53 0a 12 f9 9a 85 6a b5 65 ab |..).{3S.....j.e.|
00000010 28 2d fd b2 c4 df e3 d3 f8 8c c8 0d ac ab 7b 2d |(-............{-|
[2d53 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 28 f0 f2 6b 29 2d d6 3a 70 6e 58 |0D. x(..k)-.:pnX|
00000010 6a 6b ae b0 52 be 04 cc 2b d7 82 24 61 3d fe e3 |jk..R...+..$a=..|
00000020 9b 59 b8 8b 02 20 26 6b 46 8d ef 86 a2 ea ff e9 |.Y... &kF.......|
00000030 b5 20 c3 06 58 55 51 da e0 bb 20 0b e1 44 ba f8 |. ..XUQ... ..D..|
00000040 c4 03 c1 f5 b9 8f |......|
[2d54 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2d55 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2d56 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d57 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d58 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[2d59 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[2d5a 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff fc 29 94 7b 33 53 0a 12 f9 9a 85 6a b5 65 ab |..).{3S.....j.e.|
00000010 28 2d fd b2 c4 df e3 d3 f8 8c c8 0d ac ab 7b 2d |(-............{-|
[2d5b 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 28 f0 f2 6b 29 2d d6 3a 70 6e 58 |0D. x(..k)-.:pnX|
00000010 6a 6b ae b0 52 be 04 cc 2b d7 82 24 61 3d fe e3 |jk..R...+..$a=..|
00000020 9b 59 b8 8b 02 20 26 6b 46 8d ef 86 a2 ea ff e9 |.Y... &kF.......|
00000030 b5 20 c3 06 58 55 51 da e0 bb 20 0b e1 44 ba f8 |. ..XUQ... ..D..|
00000040 c4 03 c1 f5 b9 8f |......|
[2d5c 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2d5d 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes
[2d5e 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d5f 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2d60 02-22 00:14:42.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 e1 6e a0 49 fe e2 6f 77 b6 91 67 ba ba 40 ea |..n.I..ow..g..@.|
00000010 41 f1 76 dc 3c 1b c8 01 b7 c2 f3 aa f6 b1 24 d0 |A.v.<.........$.|
[2d61 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 6c e4 e5 12 f4 05 4e 7c cd 88 ec |0D. *l.....N|...|
00000010 de e8 84 7c 7b 82 fb 1e a1 d6 f7 c4 d1 a5 3d dc |...|{.........=.|
00000020 87 49 db 23 02 20 3c d7 56 86 9b 6e af a1 20 66 |.I.#. <.V..n.. f|
00000030 93 99 ef df 24 83 80 95 40 60 3a 97 5b 8b 03 0a |....$...@`:.[...|
00000040 06 7d 52 7a 95 74 |.}Rz.t|
[2d62 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes
[2d63 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d64 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[2d65 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d66 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2d67 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2d68 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2d69 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2d6a 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2d6b 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2d6c 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 18 a0 9f 86 e1 fc 10 41 29 7b bb 0a 45 24 45 |........A){..E$E|
00000010 c5 0c 59 a7 02 67 2a 08 0f 4d fe 37 c4 a2 5f 4b |..Y..g*..M.7.._K|
[2d6d 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 69 89 cc dc 1a e5 61 b6 64 ad 1d |0D. {i.....a.d..|
00000010 40 40 e3 62 c8 52 10 7e 2d 30 b9 11 b6 4b 48 ba |@@.b.R.~-0...KH.|
00000020 b4 82 92 9c 02 20 05 16 1a b6 71 36 5b 29 f3 26 |..... ....q6[).&|
00000030 68 45 a4 de f2 5c e3 a0 fb 39 1c 39 e5 d6 9d 57 |hE...\...9.9...W|
00000040 05 5d 55 16 cb 53 |.]U..S|
[2d6e 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2d6f 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290340 gate 1582330482600699200 evaluation starts
[2d70 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290340 signed by 0 principal evaluation starts (used [false])
[2d71 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290340 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2d72 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2d73 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290340 principal evaluation fails
[2d74 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290340 gate 1582330482600699200 evaluation fails
[2d75 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2d76 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2d77 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2d78 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 18 a0 9f 86 e1 fc 10 41 29 7b bb 0a 45 24 45 |........A){..E$E|
00000010 c5 0c 59 a7 02 67 2a 08 0f 4d fe 37 c4 a2 5f 4b |..Y..g*..M.7.._K|
[2d79 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 69 89 cc dc 1a e5 61 b6 64 ad 1d |0D. {i.....a.d..|
00000010 40 40 e3 62 c8 52 10 7e 2d 30 b9 11 b6 4b 48 ba |@@.b.R.~-0...KH.|
00000020 b4 82 92 9c 02 20 05 16 1a b6 71 36 5b 29 f3 26 |..... ....q6[).&|
00000030 68 45 a4 de f2 5c e3 a0 fb 39 1c 39 e5 d6 9d 57 |hE...\...9.9...W|
00000040 05 5d 55 16 cb 53 |.]U..S|
[2d7a 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2d7b 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290c40 gate 1582330482602853800 evaluation starts
[2d7c 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290c40 signed by 0 principal evaluation starts (used [false])
[2d7d 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290c40 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2d7e 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290c40 principal evaluation succeeds for identity 0
[2d7f 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290c40 gate 1582330482602853800 evaluation succeeds
[2d80 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2d81 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2d83 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2d84 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2d82 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d85 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes
[2d86 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d87 02-22 00:14:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d88 02-22 00:14:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d89 02-22 00:14:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d8a 02-22 00:14:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[2d8b 02-22 00:14:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[2d8c 02-22 00:14:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d8d 02-22 00:14:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[2d8e 02-22 00:14:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d8f 02-22 00:14:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[2d90 02-22 00:14:43.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2d91 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[2d92 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[2d93 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[2d94 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[2d95 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[2d96 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d97 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2d98 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2d99 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2d9a 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2d9b 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2d9c 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2d9d 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2d9e 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2d9f 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2da0 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2da1 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c8520 gate 1582330483084150400 evaluation starts
[2da2 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c8520 signed by 0 principal evaluation starts (used [false])
[2da3 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c8520 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2da4 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c8520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2da5 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c8520 principal evaluation fails
[2da6 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c8520 gate 1582330483084150400 evaluation fails
[2da7 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2da8 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2da9 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2daa 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2dab 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2dac 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2dad 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c8e20 gate 1582330483085060600 evaluation starts
[2dae 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c8e20 signed by 0 principal evaluation starts (used [false])
[2daf 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c8e20 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2db0 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c8e20 principal evaluation succeeds for identity 0
[2db1 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c8e20 gate 1582330483085060600 evaluation succeeds
[2db2 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2db3 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2db4 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2db5 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2db6 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2db7 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2db8 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2db9 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2dba 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2dbb 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2dbc 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2dbd 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2dbe 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[2dbf 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2dc0 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2dc1 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032de880 gate 1582330483087039800 evaluation starts
[2dc2 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032de880 signed by 0 principal evaluation starts (used [false])
[2dc3 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032de880 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2dc4 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032de880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2dc5 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032de880 principal evaluation fails
[2dc6 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032de880 gate 1582330483087039800 evaluation fails
[2dc7 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2dc8 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2dc9 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2dca 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[2dcb 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2dcc 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2dcd 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032df180 gate 1582330483087695500 evaluation starts
[2dce 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032df180 signed by 0 principal evaluation starts (used [false])
[2dcf 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032df180 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2dd0 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032df180 principal evaluation succeeds for identity 0
[2dd1 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032df180 gate 1582330483087695500 evaluation succeeds
[2dd2 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2dd3 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2dd4 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2dd5 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2dd6 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2dd7 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[2dd8 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2dd9 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2dda 02-22 00:14:43.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ddb 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2ddc 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2ddd 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2dde 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2ddf 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2de0 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2de1 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2de2 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2de3 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2de4 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032feec0 gate 1582330483090998800 evaluation starts
[2de5 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032feec0 signed by 0 principal evaluation starts (used [false])
[2de6 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032feec0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2de7 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032feec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2de8 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032feec0 principal evaluation fails
[2de9 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032feec0 gate 1582330483090998800 evaluation fails
[2dea 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2deb 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2dec 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2ded 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2dee 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2def 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2df0 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ff7c0 gate 1582330483091451000 evaluation starts
[2df1 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ff7c0 signed by 0 principal evaluation starts (used [false])
[2df2 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ff7c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2df3 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ff7c0 principal evaluation succeeds for identity 0
[2df4 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ff7c0 gate 1582330483091451000 evaluation succeeds
[2df5 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2df6 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2df7 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2df8 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2df9 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[2dfa 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[2dfb 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[2dfc 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[2dfd 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2dfe 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2dff 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2e00 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2e01 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2e02 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2e03 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2e04 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2e05 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[2e06 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2e07 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2e08 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003333f80 gate 1582330483092884600 evaluation starts
[2e09 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003333f80 signed by 0 principal evaluation starts (used [false])
[2e0a 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003333f80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2e0b 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003333f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2e0c 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003333f80 principal evaluation fails
[2e0d 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003333f80 gate 1582330483092884600 evaluation fails
[2e0e 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2e0f 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2e10 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2e11 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[2e12 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2e13 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2e14 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334a880 gate 1582330483093978000 evaluation starts
[2e15 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334a880 signed by 0 principal evaluation starts (used [false])
[2e16 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334a880 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2e17 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334a880 principal evaluation succeeds for identity 0
[2e18 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334a880 gate 1582330483093978000 evaluation succeeds
[2e19 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2e1a 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2e1b 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2e1c 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2e1d 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e1e 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[2e1f 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[2e20 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e21 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e22 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e23 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2e24 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2e25 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2e26 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2e27 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2e28 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2e29 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[2e2a 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2e2b 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2e2c 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033666c0 gate 1582330483095054700 evaluation starts
[2e2d 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033666c0 signed by 0 principal evaluation starts (used [false])
[2e2e 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033666c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2e2f 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033666c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2e30 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033666c0 principal evaluation fails
[2e31 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033666c0 gate 1582330483095054700 evaluation fails
[2e32 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2e33 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2e34 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2e35 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[2e36 02-22 00:14:43.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[2e37 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2e39 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003366fc0 gate 1582330483112390300 evaluation starts
[2e38 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info
[2e3a 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003366fc0 signed by 0 principal evaluation starts (used [false])
[2e3b 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003366fc0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2e3c 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]
[2e3d 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003366fc0 principal evaluation succeeds for identity 0
[2e3e 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003366fc0 gate 1582330483112390300 evaluation succeeds
[2e3f 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2e40 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile
[2e41 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2e42 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2e43 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2e44 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[2e45 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[2e46 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e47 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e48 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2e49 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2e4a 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2e4b 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2e4c 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2e4d 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2e4e 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2e4f 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2e50 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2e51 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033770d0 gate 1582330483114280000 evaluation starts
[2e52 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033770d0 signed by 0 principal evaluation starts (used [false])
[2e53 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033770d0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2e54 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033770d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2e55 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033770d0 principal evaluation fails
[2e56 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033770d0 gate 1582330483114280000 evaluation fails
[2e57 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2e58 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2e59 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2e5a 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[2e5b 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[2e5c 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2e5d 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033779d0 gate 1582330483114687200 evaluation starts
[2e5e 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033779d0 signed by 0 principal evaluation starts (used [false])
[2e5f 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033779d0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2e60 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033779d0 principal evaluation succeeds for identity 0
[2e61 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033779d0 gate 1582330483114687200 evaluation succeeds
[2e62 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2e63 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2e64 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2e65 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2e66 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[2e67 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[2e68 02-22 00:14:43.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e69 02-22 00:14:43.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e6a 02-22 00:14:43.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e6b 02-22 00:14:43.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[2e6c 02-22 00:14:43.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e6d 02-22 00:14:43.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e6e 02-22 00:14:43.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6537513950352060348 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[2e6f 02-22 00:14:43.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6537513950352060348 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[2e70 02-22 00:14:43.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e71 02-22 00:14:43.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6537513950352060348 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[2e72 02-22 00:14:43.18 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6537513950352060348 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[2e73 02-22 00:14:43.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e74 02-22 00:14:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[2e75 02-22 00:14:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e76 02-22 00:14:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e77 02-22 00:14:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e78 02-22 00:14:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12930817409190104340 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[2e79 02-22 00:14:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12930817409190104340 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[2e7a 02-22 00:14:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[2e7b 02-22 00:14:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e7c 02-22 00:14:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[2e7d 02-22 00:14:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e7e 02-22 00:14:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e7f 02-22 00:14:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e80 02-22 00:14:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e81 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2e82 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e83 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2e84 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2e85 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 79 fd 74 52 85 a0 4a 68 53 92 77 04 79 bc fa 87 |y.tR..JhS.w.y...|
00000010 a4 a2 95 9e 96 11 03 c9 0a 0f c2 99 08 d9 8f 08 |................|
[2e86 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f df 05 8d d2 06 21 89 ce f1 c6 |0E.!.......!....|
00000010 5a fd ed 29 43 d9 5f df 89 04 b2 57 81 63 00 4f |Z..)C._....W.c.O|
00000020 6a 7a c1 2d 93 02 20 12 91 55 eb 02 85 01 35 6d |jz.-.. ..U....5m|
00000030 12 7b b9 b0 b3 89 e8 bb 20 e0 a1 b4 3e af 9e 3a |.{...... ...>..:|
00000040 93 e2 56 6c be 2d 69 |..Vl.-i|
[2e87 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[2e88 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e 10 a2 d6 3b 6d b4 5b f9 dc 1c bb |0D. ^...;m.[....|
00000010 c8 3f 03 bc 45 9e 60 07 2a 7a d6 3a 12 fa dc d3 |.?..E.`.*z.:....|
00000020 f9 48 7e 7d 02 20 68 62 af 02 f9 34 70 79 d2 ac |.H~}. hb...4py..|
00000030 d8 d0 59 3e ab b6 e6 95 f2 28 af 8c 04 00 d1 a1 |..Y>.....(......|
00000040 98 ad 4d 89 5a 79 |..M.Zy|
[2e89 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2e8a 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[2e8b 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:45
[2e8c 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:45
[2e8d 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[2e8e 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e8f 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e90 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e91 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e92 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e93 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e94 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[2e95 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2e96 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[2e97 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes
[2e98 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes
[2e99 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e9a 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e9b 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes
[2e9c 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e9d 02-22 00:14:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes
[2e9e 02-22 00:14:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2e9f 02-22 00:14:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes
[2ea0 02-22 00:14:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes
[2ea1 02-22 00:14:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ea2 02-22 00:14:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes
[2ea3 02-22 00:14:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ea4 02-22 00:14:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[2ea5 02-22 00:14:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[2ea6 02-22 00:14:44.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ea7 02-22 00:14:44.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ea8 02-22 00:14:44.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ea9 02-22 00:14:44.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2eaa 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2eab 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2eac 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ead 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2eae 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[2eaf 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2eb0 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2eb1 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2eb2 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2eb3 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2eb4 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2eb5 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2eb6 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 8c 33 9d 6c 58 11 aa b4 c0 16 3b 94 46 3f 1c |..3.lX.....;.F?.|
00000010 08 08 6c 67 57 1d a7 71 a3 0d e8 5d fe 87 3b 1a |..lgW..q...]..;.|
[2eb7 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 5a 7a 08 b6 95 f8 0c 94 f6 66 |0E.!..Zz.......f|
00000010 c1 0a 0c c3 e0 00 6f b5 16 54 2b 2c ed d2 dd a6 |......o..T+,....|
00000020 56 de 78 6b 5e 02 20 09 99 02 bb 33 67 67 81 ae |V.xk^. ....3gg..|
00000030 0f 2d 16 c3 79 7a 4c 21 3f 80 f8 4c 00 b5 8b 39 |.-..yzL!?..L...9|
00000040 a5 0b 00 b2 16 47 a0 |.....G.|
[2eb8 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2eb9 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d75c0 gate 1582330484307427600 evaluation starts
[2eba 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d75c0 signed by 0 principal evaluation starts (used [false])
[2ebb 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d75c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2ebc 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d75c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2ebd 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d75c0 principal evaluation fails
[2ebe 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d75c0 gate 1582330484307427600 evaluation fails
[2ebf 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2ec0 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2ec1 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2ec2 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 8c 33 9d 6c 58 11 aa b4 c0 16 3b 94 46 3f 1c |..3.lX.....;.F?.|
00000010 08 08 6c 67 57 1d a7 71 a3 0d e8 5d fe 87 3b 1a |..lgW..q...]..;.|
[2ec3 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 5a 7a 08 b6 95 f8 0c 94 f6 66 |0E.!..Zz.......f|
00000010 c1 0a 0c c3 e0 00 6f b5 16 54 2b 2c ed d2 dd a6 |......o..T+,....|
00000020 56 de 78 6b 5e 02 20 09 99 02 bb 33 67 67 81 ae |V.xk^. ....3gg..|
00000030 0f 2d 16 c3 79 7a 4c 21 3f 80 f8 4c 00 b5 8b 39 |.-..yzL!?..L...9|
00000040 a5 0b 00 b2 16 47 a0 |.....G.|
[2ec4 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2ec5 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d7ec0 gate 1582330484308296000 evaluation starts
[2ec6 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d7ec0 signed by 0 principal evaluation starts (used [false])
[2ec7 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d7ec0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2ec8 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d7ec0 principal evaluation succeeds for identity 0
[2ec9 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d7ec0 gate 1582330484308296000 evaluation succeeds
[2eca 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2ecb 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2ecc 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2ecd 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2ece 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2ecf 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes]}
[2ed0 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:44
[2ed1 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:44
[2ed2 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[2ed3 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ed4 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ed5 02-22 00:14:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ed6 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ed7 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ed8 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ed9 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2eda 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2edb 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2edc 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2edd 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[2ede 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2edf 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[2ee0 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2ee1 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ee2 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2ee3 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ee4 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2ee5 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ee6 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2ee7 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2ee8 02-22 00:14:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2ee9 02-22 00:14:44.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2eea 02-22 00:14:44.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[2eeb 02-22 00:14:44.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2eec 02-22 00:14:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[2eed 02-22 00:14:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[2eee 02-22 00:14:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA15100D1801
[2eef 02-22 00:14:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 81D1795B3FDEFE49C05050C6574C8A6708A4EC90A49A4549812F8D2AAB044A07
[2ef0 02-22 00:14:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[2ef1 02-22 00:14:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ef2 02-22 00:14:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ef3 02-22 00:14:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ef4 02-22 00:14:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ef5 02-22 00:14:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[2ef6 02-22 00:14:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ef7 02-22 00:14:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2ef8 02-22 00:14:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[2ef9 02-22 00:14:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2efa 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2efb 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2efc 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2efd 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[2efe 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2eff 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2f00 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2f01 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2f02 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2f03 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2f04 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2f05 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3f 79 ca b6 39 67 05 07 c6 0a 73 af 5c a2 20 |.?y..9g....s.\. |
00000010 64 d0 35 83 d0 30 bc d7 af c3 59 93 1e 57 f2 c3 |d.5..0....Y..W..|
[2f06 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 f0 64 7f 6e 44 58 05 8b 3c c4 |0E.!...d.nDX..<.|
00000010 35 d5 7e 4c 81 1b 6e ba f0 b7 76 73 7d 8b fc e4 |5.~L..n...vs}...|
00000020 12 07 76 e8 be 02 20 3a 25 56 96 bc ec d9 6a d4 |..v... :%V....j.|
00000030 7a b4 b2 b2 a1 88 9c 2f f3 f8 b8 9b b2 ae 83 97 |z....../........|
00000040 d8 88 c9 d0 ec cd 59 |......Y|
[2f07 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2f08 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343d2c0 gate 1582330484395860000 evaluation starts
[2f09 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343d2c0 signed by 0 principal evaluation starts (used [false])
[2f0a 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343d2c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2f0b 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343d2c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2f0c 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343d2c0 principal evaluation fails
[2f0d 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343d2c0 gate 1582330484395860000 evaluation fails
[2f0e 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2f0f 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2f10 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2f11 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3f 79 ca b6 39 67 05 07 c6 0a 73 af 5c a2 20 |.?y..9g....s.\. |
00000010 64 d0 35 83 d0 30 bc d7 af c3 59 93 1e 57 f2 c3 |d.5..0....Y..W..|
[2f12 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 f0 64 7f 6e 44 58 05 8b 3c c4 |0E.!...d.nDX..<.|
00000010 35 d5 7e 4c 81 1b 6e ba f0 b7 76 73 7d 8b fc e4 |5.~L..n...vs}...|
00000020 12 07 76 e8 be 02 20 3a 25 56 96 bc ec d9 6a d4 |..v... :%V....j.|
00000030 7a b4 b2 b2 a1 88 9c 2f f3 f8 b8 9b b2 ae 83 97 |z....../........|
00000040 d8 88 c9 d0 ec cd 59 |......Y|
[2f13 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2f14 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343dbc0 gate 1582330484396842100 evaluation starts
[2f15 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343dbc0 signed by 0 principal evaluation starts (used [false])
[2f16 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343dbc0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2f17 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343dbc0 principal evaluation succeeds for identity 0
[2f18 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343dbc0 gate 1582330484396842100 evaluation succeeds
[2f19 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2f1a 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2f1b 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2f1c 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2f1d 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2f1e 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes]}
[2f1f 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:42
[2f20 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:42
[2f21 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[2f22 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f23 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f24 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f25 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f26 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f27 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f28 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f29 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f2a 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f2b 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[2f2c 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f2d 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f2e 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[2f2f 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2f30 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f31 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2f32 02-22 00:14:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f33 02-22 00:14:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2f34 02-22 00:14:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f35 02-22 00:14:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2f36 02-22 00:14:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f37 02-22 00:14:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2f38 02-22 00:14:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2f39 02-22 00:14:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f3a 02-22 00:14:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes
[2f3b 02-22 00:14:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f3c 02-22 00:14:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151029
[2f3d 02-22 00:14:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 00D678697C2266B9115394C0BBE4E34B00C50F447D9F0F1C7C99A308BFB80818
[2f3e 02-22 00:14:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[2f3f 02-22 00:14:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[2f40 02-22 00:14:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[2f41 02-22 00:14:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f42 02-22 00:14:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f43 02-22 00:14:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f44 02-22 00:14:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2f45 02-22 00:14:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[2f46 02-22 00:14:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f48 02-22 00:14:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[2f4a 02-22 00:14:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes
[2f4b 02-22 00:14:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f49 02-22 00:14:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[2f4c 02-22 00:14:44.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f47 02-22 00:14:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes
[2f4d 02-22 00:14:44.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f4e 02-22 00:14:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:13732542636315342224 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2f4f 02-22 00:14:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13732542636315342224 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2f50 02-22 00:14:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f51 02-22 00:14:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f52 02-22 00:14:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f53 02-22 00:14:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f54 02-22 00:14:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f55 02-22 00:14:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f56 02-22 00:14:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[2f57 02-22 00:14:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f58 02-22 00:14:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[2f59 02-22 00:14:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f5a 02-22 00:14:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[2f5b 02-22 00:14:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[2f5c 02-22 00:14:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 0a 9c cb a5 bd 77 db a5 9a 0e b8 47 46 21 84 |......w.....GF!.|
00000010 14 e4 4f d0 df 34 40 11 fd 6b 9e ee 9f 05 c8 78 |..O..4@..k.....x|
[2f5d 02-22 00:14:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea b3 51 74 09 44 b6 d3 02 87 a5 |0E.!...Qt.D.....|
00000010 64 1f ad eb 1a 75 e9 35 a1 6d 9f f0 f2 e1 a3 cd |d....u.5.m......|
00000020 cb 9e 18 8e 6a 02 20 74 54 08 44 26 d6 0f 15 a3 |....j. tT.D&....|
00000030 da 9d 10 56 ac 15 4a 4e de 85 be c7 ae 9c d7 d6 |...V..JN........|
00000040 f4 6f 7d 15 62 b4 38 |.o}.b.8|
[2f5e 02-22 00:14:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[2f5f 02-22 00:14:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 c8 25 40 8f aa 8f cf 4a 73 76 85 |0D. ..%@....Jsv.|
00000010 c1 28 05 c4 9f 29 41 99 17 a8 e1 a6 d0 c2 de 12 |.(...)A.........|
00000020 2d 99 15 59 02 20 27 41 3b 6e a9 9e ac 86 a9 87 |-..Y. 'A;n......|
00000030 8b c6 c7 e0 73 fe 68 f7 7d bb 12 e2 44 f2 a2 61 |....s.h.}...D..a|
00000040 4a 14 9a 10 95 64 |J....d|
[2f60 02-22 00:14:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[2f61 02-22 00:14:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[2f62 02-22 00:14:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:46
[2f63 02-22 00:14:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:46
[2f64 02-22 00:14:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[2f65 02-22 00:14:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f66 02-22 00:14:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f67 02-22 00:14:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f68 02-22 00:14:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[2f69 02-22 00:14:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f6a 02-22 00:14:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f6b 02-22 00:14:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[2f6c 02-22 00:14:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[2f6d 02-22 00:14:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[2f6e 02-22 00:14:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f6f 02-22 00:14:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:2464535079815304686 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2f70 02-22 00:14:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:2464535079815304686 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2f71 02-22 00:14:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[2f72 02-22 00:14:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f73 02-22 00:14:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:4032336118063416207 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2f74 02-22 00:14:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:4032336118063416207 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2f75 02-22 00:14:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:4032336118063416207 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2f76 02-22 00:14:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f77 02-22 00:14:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f78 02-22 00:14:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f79 02-22 00:14:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f7a 02-22 00:14:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f7b 02-22 00:14:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f7c 02-22 00:14:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[2f7d 02-22 00:14:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f7e 02-22 00:14:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[2f7f 02-22 00:14:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:4951764690397590194 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[2f80 02-22 00:14:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[2f81 02-22 00:14:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2970485602231033460 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[2f82 02-22 00:14:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[2f83 02-22 00:14:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10675335486962518296 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[2f84 02-22 00:14:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:4951764690397590194 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2f85 02-22 00:14:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f86 02-22 00:14:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2970485602231033460 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[2f88 02-22 00:14:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f87 02-22 00:14:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10675335486962518296 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[2f89 02-22 00:14:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f8a 02-22 00:14:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2970485602231033460 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[2f8b 02-22 00:14:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2970485602231033460 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[2f8c 02-22 00:14:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f8d 02-22 00:14:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4951764690397590194 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[2f8e 02-22 00:14:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4951764690397590194 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[2f8f 02-22 00:14:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f90 02-22 00:14:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10675335486962518296 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[2f91 02-22 00:14:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10675335486962518296 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[2f92 02-22 00:14:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10675335486962518296 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[2f93 02-22 00:14:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f94 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2f95 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2f96 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2f97 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[2f98 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2f99 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2f9a 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2f9b 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2f9c 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2f9d 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2f9e 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2f9f 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 1d 04 55 16 63 fc 72 68 e0 72 4a 22 25 93 91 |#..U.c.rh.rJ"%..|
00000010 b7 79 18 85 f0 69 d2 9b da e6 29 52 87 74 c4 19 |.y...i....)R.t..|
[2fa0 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b c0 2f 0c c8 53 18 09 22 ad 46 62 |0D. [./..S..".Fb|
00000010 f7 74 7f 1c be f9 27 de d7 3e 7e 28 6e 12 a6 8a |.t....'..>~(n...|
00000020 37 dc a1 44 02 20 2d fa 22 fc 4a 37 fa 8a d9 c2 |7..D. -.".J7....|
00000030 c6 1f 9a c1 b7 31 73 70 70 30 37 1f fb a1 ff 29 |.....1spp07....)|
00000040 a7 f0 93 6d cb df |...m..|
[2fa1 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2fa2 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ea780 gate 1582330486478522600 evaluation starts
[2fa3 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ea780 signed by 0 principal evaluation starts (used [false])
[2fa4 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ea780 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2fa5 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ea780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2fa6 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ea780 principal evaluation fails
[2fa7 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ea780 gate 1582330486478522600 evaluation fails
[2fa8 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2fa9 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2faa 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2fab 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 1d 04 55 16 63 fc 72 68 e0 72 4a 22 25 93 91 |#..U.c.rh.rJ"%..|
00000010 b7 79 18 85 f0 69 d2 9b da e6 29 52 87 74 c4 19 |.y...i....)R.t..|
[2fac 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b c0 2f 0c c8 53 18 09 22 ad 46 62 |0D. [./..S..".Fb|
00000010 f7 74 7f 1c be f9 27 de d7 3e 7e 28 6e 12 a6 8a |.t....'..>~(n...|
00000020 37 dc a1 44 02 20 2d fa 22 fc 4a 37 fa 8a d9 c2 |7..D. -.".J7....|
00000030 c6 1f 9a c1 b7 31 73 70 70 30 37 1f fb a1 ff 29 |.....1spp07....)|
00000040 a7 f0 93 6d cb df |...m..|
[2fad 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2fae 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034eb080 gate 1582330486479090500 evaluation starts
[2faf 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034eb080 signed by 0 principal evaluation starts (used [false])
[2fb0 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034eb080 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[2fb1 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034eb080 principal evaluation succeeds for identity 0
[2fb2 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034eb080 gate 1582330486479090500 evaluation succeeds
[2fb3 02-22 00:14:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2fb4 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:45 , Envelope: 83 bytes, Signature: 69 bytes , Envelope: 164 bytes, Signature: 0 bytes
[2fb5 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:45 , Envelope: 83 bytes, Signature: 69 bytes , Envelope: 164 bytes, Signature: 0 bytes
[2fb6 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2fb7 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2fb8 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2fb9 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes
[2fba 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes]}
[2fbb 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:43
[2fbc 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:43
[2fbd 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[2fbe 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2fbf 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2fc0 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2fc1 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[2fc2 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2fc3 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2fc4 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2fc5 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[2fc6 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[2fc7 02-22 00:14:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[2fc8 02-22 00:14:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2fc9 02-22 00:14:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2fca 02-22 00:14:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:45 , Envelope: 83 bytes, Signature: 69 bytes , Envelope: 164 bytes, Signature: 0 bytes
[2fcb 02-22 00:14:46.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15102A
[2fcc 02-22 00:14:46.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2EA2212B93804A0C0367810D33ADF0B5545E0F8D88E33C31144F9FA56F05CD69
[2fcd 02-22 00:14:46.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[2fce 02-22 00:14:46.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[2fcf 02-22 00:14:46.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2fd0 02-22 00:14:46.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[2fd1 02-22 00:14:46.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2fd2 02-22 00:14:46.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[2fd3 02-22 00:14:46.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[2fd4 02-22 00:14:46.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[2fd5 02-22 00:14:46.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2fd6 02-22 00:14:46.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2fd7 02-22 00:14:46.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2fd8 02-22 00:14:46.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[2fd9 02-22 00:14:46.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[2fda 02-22 00:14:46.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[2fdb 02-22 00:14:46.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[2fdc 02-22 00:14:46.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[2fdd 02-22 00:14:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[2fde 02-22 00:14:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[2fe0 02-22 00:14:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[2fdf 02-22 00:14:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[2fe1 02-22 00:14:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[2fe2 02-22 00:14:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[2fe3 02-22 00:14:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 70 48 e6 a8 81 65 dd af 2a cb ea f2 f2 3f e0 |.pH...e..*....?.|
00000010 41 c2 e8 94 ec 1b a0 fe d4 c9 8d 12 de 0a 6d 35 |A.............m5|
[2fe4 02-22 00:14:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 45 ab 50 c1 8f e7 f6 07 f4 de d1 b8 |0C. E.P.........|
00000010 cd 62 6d 51 79 3c 84 f7 e0 dd 8d fc e0 15 0f 02 |.bmQy<..........|
00000020 73 8b 4a e3 02 1f 7a 60 49 2e b9 20 66 4e 6d 33 |s.J...z`I.. fNm3|
00000030 53 0d 96 a6 18 05 96 76 a1 fa 99 36 f2 70 a8 2a |S......v...6.p.*|
00000040 19 a3 9e 90 2d |....-|
[2fe5 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[2fe6 02-22 00:14:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2fe7 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003503b20 gate 1582330486552094400 evaluation starts
[2fe8 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003503b20 signed by 0 principal evaluation starts (used [false])
[2fe9 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003503b20 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2fea 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003503b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[2feb 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003503b20 principal evaluation fails
[2fec 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003503b20 gate 1582330486552094400 evaluation fails
[2fed 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[2fee 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[2fef 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[2ff0 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 70 48 e6 a8 81 65 dd af 2a cb ea f2 f2 3f e0 |.pH...e..*....?.|
00000010 41 c2 e8 94 ec 1b a0 fe d4 c9 8d 12 de 0a 6d 35 |A.............m5|
[2ff1 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 45 ab 50 c1 8f e7 f6 07 f4 de d1 b8 |0C. E.P.........|
00000010 cd 62 6d 51 79 3c 84 f7 e0 dd 8d fc e0 15 0f 02 |.bmQy<..........|
00000020 73 8b 4a e3 02 1f 7a 60 49 2e b9 20 66 4e 6d 33 |s.J...z`I.. fNm3|
00000030 53 0d 96 a6 18 05 96 76 a1 fa 99 36 f2 70 a8 2a |S......v...6.p.*|
00000040 19 a3 9e 90 2d |....-|
[2ff2 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[2ff3 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003544420 gate 1582330486553134800 evaluation starts
[2ff4 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003544420 signed by 0 principal evaluation starts (used [false])
[2ff5 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003544420 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[2ff6 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003544420 principal evaluation succeeds for identity 0
[2ff7 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003544420 gate 1582330486553134800 evaluation succeeds
[2ff8 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[2ff9 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[2ffa 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[2ffb 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[2ffc 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:45 , Envelope: 83 bytes, Signature: 69 bytes
[2ffd 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:45 , Envelope: 83 bytes, Signature: 69 bytes]}
[2ffe 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:45
[2fff 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:45
[3000 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[3001 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3002 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3003 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3004 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[3005 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3006 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3007 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3008 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[3009 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[300a 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[300b 02-22 00:14:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[300c 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[300d 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[300e 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[300f 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[3010 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e a2 21 2b 93 80 4a 0c 03 67 81 0d 33 ad f0 b5 |..!+..J..g..3...|
00000010 54 5e 0f 8d 88 e3 3c 31 14 4f 9f a5 6f 05 cd 69 |T^....<1.O..o..i|
[3011 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 08 50 c3 34 dd 74 e7 61 68 81 90 |0D. (.P.4.t.ah..|
00000010 cb d2 c3 39 08 a0 57 a4 41 9c 32 7e 87 fa 38 1f |...9..W.A.2~..8.|
00000020 65 d6 a8 15 02 20 33 39 eb 4f ae cc 01 70 46 70 |e.... 39.O...pFp|
00000030 5f 5b 8e 30 33 35 7e b1 36 26 dc 9f b3 75 d0 48 |_[.035~.6&...u.H|
00000040 15 7d 03 22 83 f6 |.}."..|
[3012 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[3013 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 df 4c 7e 55 f2 8d 55 9a 0e 2d bc |0E.!..L~U..U..-.|
00000010 ca 6b 5c 09 ca 26 3e 36 bd 3c 13 0e 1f bd 0f ab |.k\..&>6.<......|
00000020 1a 22 5e 01 9d 02 20 7f 48 6a 61 15 f6 16 34 74 |."^... .Hja...4t|
00000030 9c 26 33 1f 0e 53 13 f3 e6 a6 8d fc 5e be f4 35 |.&3..S......^..5|
00000040 68 2c 4b c8 4f fd 11 |h,K.O..|
[3014 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3015 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3016 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3017 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3018 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3019 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[301a 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[301b 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[301c 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[301d 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[301e 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[301f 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3020 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3021 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3022 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3023 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 1d 04 55 16 63 fc 72 68 e0 72 4a 22 25 93 91 |#..U.c.rh.rJ"%..|
00000010 b7 79 18 85 f0 69 d2 9b da e6 29 52 87 74 c4 19 |.y...i....)R.t..|
[3024 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b c0 2f 0c c8 53 18 09 22 ad 46 62 |0D. [./..S..".Fb|
00000010 f7 74 7f 1c be f9 27 de d7 3e 7e 28 6e 12 a6 8a |.t....'..>~(n...|
00000020 37 dc a1 44 02 20 2d fa 22 fc 4a 37 fa 8a d9 c2 |7..D. -.".J7....|
00000030 c6 1f 9a c1 b7 31 73 70 70 30 37 1f fb a1 ff 29 |.....1spp07....)|
00000040 a7 f0 93 6d cb df |...m..|
[3025 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3026 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567aa0 gate 1582330486566485800 evaluation starts
[3027 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567aa0 signed by 0 principal evaluation starts (used [false])
[3028 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567aa0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3029 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[302a 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567aa0 principal evaluation fails
[302b 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567aa0 gate 1582330486566485800 evaluation fails
[302c 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[302d 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[302e 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[302f 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 1d 04 55 16 63 fc 72 68 e0 72 4a 22 25 93 91 |#..U.c.rh.rJ"%..|
00000010 b7 79 18 85 f0 69 d2 9b da e6 29 52 87 74 c4 19 |.y...i....)R.t..|
[3030 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b c0 2f 0c c8 53 18 09 22 ad 46 62 |0D. [./..S..".Fb|
00000010 f7 74 7f 1c be f9 27 de d7 3e 7e 28 6e 12 a6 8a |.t....'..>~(n...|
00000020 37 dc a1 44 02 20 2d fa 22 fc 4a 37 fa 8a d9 c2 |7..D. -.".J7....|
00000030 c6 1f 9a c1 b7 31 73 70 70 30 37 1f fb a1 ff 29 |.....1spp07....)|
00000040 a7 f0 93 6d cb df |...m..|
[3031 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3032 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035743a0 gate 1582330486568281700 evaluation starts
[3033 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035743a0 signed by 0 principal evaluation starts (used [false])
[3034 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035743a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3035 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035743a0 principal evaluation succeeds for identity 0
[3036 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035743a0 gate 1582330486568281700 evaluation succeeds
[3037 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3038 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3039 02-22 00:14:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[303a 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[303b 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes
[303c 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[303d 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[303e 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e a2 21 2b 93 80 4a 0c 03 67 81 0d 33 ad f0 b5 |..!+..J..g..3...|
00000010 54 5e 0f 8d 88 e3 3c 31 14 4f 9f a5 6f 05 cd 69 |T^....<1.O..o..i|
[303f 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 08 50 c3 34 dd 74 e7 61 68 81 90 |0D. (.P.4.t.ah..|
00000010 cb d2 c3 39 08 a0 57 a4 41 9c 32 7e 87 fa 38 1f |...9..W.A.2~..8.|
00000020 65 d6 a8 15 02 20 33 39 eb 4f ae cc 01 70 46 70 |e.... 39.O...pFp|
00000030 5f 5b 8e 30 33 35 7e b1 36 26 dc 9f b3 75 d0 48 |_[.035~.6&...u.H|
00000040 15 7d 03 22 83 f6 |.}."..|
[3040 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[3041 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[3042 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3043 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[3044 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 0a 9c cb a5 bd 77 db a5 9a 0e b8 47 46 21 84 |......w.....GF!.|
00000010 14 e4 4f d0 df 34 40 11 fd 6b 9e ee 9f 05 c8 78 |..O..4@..k.....x|
[3045 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea b3 51 74 09 44 b6 d3 02 87 a5 |0E.!...Qt.D.....|
00000010 64 1f ad eb 1a 75 e9 35 a1 6d 9f f0 f2 e1 a3 cd |d....u.5.m......|
00000020 cb 9e 18 8e 6a 02 20 74 54 08 44 26 d6 0f 15 a3 |....j. tT.D&....|
00000030 da 9d 10 56 ac 15 4a 4e de 85 be c7 ae 9c d7 d6 |...V..JN........|
00000040 f4 6f 7d 15 62 b4 38 |.o}.b.8|
[3046 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3047 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3048 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3049 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[304a 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[304b 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[304c 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e a2 21 2b 93 80 4a 0c 03 67 81 0d 33 ad f0 b5 |..!+..J..g..3...|
00000010 54 5e 0f 8d 88 e3 3c 31 14 4f 9f a5 6f 05 cd 69 |T^....<1.O..o..i|
[304d 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 08 50 c3 34 dd 74 e7 61 68 81 90 |0D. (.P.4.t.ah..|
00000010 cb d2 c3 39 08 a0 57 a4 41 9c 32 7e 87 fa 38 1f |...9..W.A.2~..8.|
00000020 65 d6 a8 15 02 20 33 39 eb 4f ae cc 01 70 46 70 |e.... 39.O...pFp|
00000030 5f 5b 8e 30 33 35 7e b1 36 26 dc 9f b3 75 d0 48 |_[.035~.6&...u.H|
00000040 15 7d 03 22 83 f6 |.}."..|
[304e 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[304f 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes
[3050 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3051 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[3052 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 0a 9c cb a5 bd 77 db a5 9a 0e b8 47 46 21 84 |......w.....GF!.|
00000010 14 e4 4f d0 df 34 40 11 fd 6b 9e ee 9f 05 c8 78 |..O..4@..k.....x|
[3053 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea b3 51 74 09 44 b6 d3 02 87 a5 |0E.!...Qt.D.....|
00000010 64 1f ad eb 1a 75 e9 35 a1 6d 9f f0 f2 e1 a3 cd |d....u.5.m......|
00000020 cb 9e 18 8e 6a 02 20 74 54 08 44 26 d6 0f 15 a3 |....j. tT.D&....|
00000030 da 9d 10 56 ac 15 4a 4e de 85 be c7 ae 9c d7 d6 |...V..JN........|
00000040 f4 6f 7d 15 62 b4 38 |.o}.b.8|
[3054 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3055 02-22 00:14:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3056 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[3057 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3058 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3059 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[305a 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[305b 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[305c 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[305d 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[305e 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 70 48 e6 a8 81 65 dd af 2a cb ea f2 f2 3f e0 |.pH...e..*....?.|
00000010 41 c2 e8 94 ec 1b a0 fe d4 c9 8d 12 de 0a 6d 35 |A.............m5|
[305f 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 45 ab 50 c1 8f e7 f6 07 f4 de d1 b8 |0C. E.P.........|
00000010 cd 62 6d 51 79 3c 84 f7 e0 dd 8d fc e0 15 0f 02 |.bmQy<..........|
00000020 73 8b 4a e3 02 1f 7a 60 49 2e b9 20 66 4e 6d 33 |s.J...z`I.. fNm3|
00000030 53 0d 96 a6 18 05 96 76 a1 fa 99 36 f2 70 a8 2a |S......v...6.p.*|
00000040 19 a3 9e 90 2d |....-|
[3060 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3061 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aea30 gate 1582330486583154800 evaluation starts
[3062 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aea30 signed by 0 principal evaluation starts (used [false])
[3063 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aea30 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3064 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aea30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3065 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aea30 principal evaluation fails
[3066 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aea30 gate 1582330486583154800 evaluation fails
[3067 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3068 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3069 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[306a 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 70 48 e6 a8 81 65 dd af 2a cb ea f2 f2 3f e0 |.pH...e..*....?.|
00000010 41 c2 e8 94 ec 1b a0 fe d4 c9 8d 12 de 0a 6d 35 |A.............m5|
[306b 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 45 ab 50 c1 8f e7 f6 07 f4 de d1 b8 |0C. E.P.........|
00000010 cd 62 6d 51 79 3c 84 f7 e0 dd 8d fc e0 15 0f 02 |.bmQy<..........|
00000020 73 8b 4a e3 02 1f 7a 60 49 2e b9 20 66 4e 6d 33 |s.J...z`I.. fNm3|
00000030 53 0d 96 a6 18 05 96 76 a1 fa 99 36 f2 70 a8 2a |S......v...6.p.*|
00000040 19 a3 9e 90 2d |....-|
[306c 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[306d 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035af330 gate 1582330486584644500 evaluation starts
[306e 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035af330 signed by 0 principal evaluation starts (used [false])
[306f 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035af330 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3070 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035af330 principal evaluation succeeds for identity 0
[3071 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035af330 gate 1582330486584644500 evaluation succeeds
[3072 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3073 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3074 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3075 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3076 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:45 , Envelope: 83 bytes, Signature: 69 bytes
[3077 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3078 02-22 00:14:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3079 02-22 00:14:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[307a 02-22 00:14:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[307b 02-22 00:14:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[307c 02-22 00:14:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[307f 02-22 00:14:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[307d 02-22 00:14:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[3080 02-22 00:14:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[307e 02-22 00:14:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[3081 02-22 00:14:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3082 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3083 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3084 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3085 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3086 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3087 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3088 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3089 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[308a 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[308b 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[308c 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[308e 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[308f 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3090 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d3690 gate 1582330487085883500 evaluation starts
[308d 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3091 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d3690 signed by 0 principal evaluation starts (used [false])
[3092 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d3690 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3093 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d3690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3094 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d3690 principal evaluation fails
[3095 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d3690 gate 1582330487085883500 evaluation fails
[3096 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3097 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3098 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3099 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[309a 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[309b 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[309c 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d3fa0 gate 1582330487089474400 evaluation starts
[309d 02-22 00:14:47.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d3fa0 signed by 0 principal evaluation starts (used [false])
[309e 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d3fa0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[309f 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d3fa0 principal evaluation succeeds for identity 0
[30a0 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d3fa0 gate 1582330487089474400 evaluation succeeds
[30a1 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[30a2 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[30a3 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[30a4 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[30a5 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[30a6 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[30a7 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[30a8 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[30a9 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30aa 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30ab 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[30ac 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[30ad 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[30ae 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[30af 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[30b0 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[30b1 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[30b2 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[30b3 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[30b4 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361a760 gate 1582330487095838900 evaluation starts
[30b5 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361a760 signed by 0 principal evaluation starts (used [false])
[30b6 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361a760 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[30b7 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361a760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[30b8 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361a760 principal evaluation fails
[30b9 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361a760 gate 1582330487095838900 evaluation fails
[30ba 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[30bb 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[30bc 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[30bd 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[30be 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[30bf 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[30c0 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361b060 gate 1582330487096249800 evaluation starts
[30c1 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361b060 signed by 0 principal evaluation starts (used [false])
[30c2 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361b060 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[30c3 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361b060 principal evaluation succeeds for identity 0
[30c4 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361b060 gate 1582330487096249800 evaluation succeeds
[30c5 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[30c6 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[30c7 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[30c8 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[30c9 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[30ca 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[30cb 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[30cc 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[30cd 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[30ce 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[30cf 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30d0 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30d1 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[30d2 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[30d3 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[30d4 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[30d5 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[30d6 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[30d7 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[30d8 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[30d9 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[30da 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003643a00 gate 1582330487097574800 evaluation starts
[30db 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003643a00 signed by 0 principal evaluation starts (used [false])
[30dc 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003643a00 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[30dd 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003643a00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[30de 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003643a00 principal evaluation fails
[30df 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003643a00 gate 1582330487097574800 evaluation fails
[30e0 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[30e1 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[30e2 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[30e3 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[30e4 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[30e5 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[30e6 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e300 gate 1582330487097977700 evaluation starts
[30e7 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e300 signed by 0 principal evaluation starts (used [false])
[30e8 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e300 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[30e9 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e300 principal evaluation succeeds for identity 0
[30ea 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e300 gate 1582330487097977700 evaluation succeeds
[30eb 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[30ec 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[30ed 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[30ee 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[30ef 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30f0 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[30f1 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[30f2 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[30f3 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[30f4 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[30f5 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[30f6 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[30f7 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[30f8 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[30f9 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[30fa 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366fd60 gate 1582330487098741900 evaluation starts
[30fb 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366fd60 signed by 0 principal evaluation starts (used [false])
[30fc 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366fd60 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[30fd 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366fd60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[30fe 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366fd60 principal evaluation fails
[30ff 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366fd60 gate 1582330487098741900 evaluation fails
[3100 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3101 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3102 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3103 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[3104 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[3105 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3106 02-22 00:14:47.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368a660 gate 1582330487099141900 evaluation starts
[3107 02-22 00:14:47.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368a660 signed by 0 principal evaluation starts (used [false])
[3108 02-22 00:14:47.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368a660 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3109 02-22 00:14:47.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368a660 principal evaluation succeeds for identity 0
[310a 02-22 00:14:47.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368a660 gate 1582330487099141900 evaluation succeeds
[310b 02-22 00:14:47.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[310c 02-22 00:14:47.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[310d 02-22 00:14:47.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[310e 02-22 00:14:47.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[310f 02-22 00:14:47.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3110 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3111 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3112 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3113 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3114 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3115 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3116 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3117 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3118 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3119 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[311a 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[311b 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[311c 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[311d 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369e370 gate 1582330487128448500 evaluation starts
[311e 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369e370 signed by 0 principal evaluation starts (used [false])
[311f 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369e370 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3120 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369e370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3121 02-22 00:14:47.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369e370 principal evaluation fails
[3122 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369e370 gate 1582330487128448500 evaluation fails
[3123 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3124 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3125 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3126 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[3127 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[3128 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3129 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369ec70 gate 1582330487132857800 evaluation starts
[312a 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369ec70 signed by 0 principal evaluation starts (used [false])
[312b 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369ec70 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[312c 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369ec70 principal evaluation succeeds for identity 0
[312d 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369ec70 gate 1582330487132857800 evaluation succeeds
[312e 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[312f 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3130 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3131 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3132 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[3133 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[3134 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3135 02-22 00:14:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3136 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3137 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3138 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3139 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[313a 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[313b 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[313c 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[313d 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[313e 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[313f 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0d80 gate 1582330487143873600 evaluation starts
[3140 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0d80 signed by 0 principal evaluation starts (used [false])
[3141 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0d80 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3142 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3143 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0d80 principal evaluation fails
[3144 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c0d80 gate 1582330487143873600 evaluation fails
[3145 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3146 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3147 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3148 02-22 00:14:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3149 02-22 00:14:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[314a 02-22 00:14:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[314b 02-22 00:14:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c1680 gate 1582330487151482600 evaluation starts
[314c 02-22 00:14:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c1680 signed by 0 principal evaluation starts (used [false])
[314d 02-22 00:14:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c1680 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[314e 02-22 00:14:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c1680 principal evaluation succeeds for identity 0
[314f 02-22 00:14:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c1680 gate 1582330487151482600 evaluation succeeds
[3150 02-22 00:14:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3151 02-22 00:14:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3152 02-22 00:14:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3153 02-22 00:14:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3154 02-22 00:14:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[3155 02-22 00:14:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[3156 02-22 00:14:47.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3157 02-22 00:14:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3158 02-22 00:14:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3159 02-22 00:14:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[315a 02-22 00:14:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[315b 02-22 00:14:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[315c 02-22 00:14:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14027063919670314974 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[315d 02-22 00:14:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14027063919670314974 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[315e 02-22 00:14:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[315f 02-22 00:14:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 14027063919670314974 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[3160 02-22 00:14:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 14027063919670314974 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[3161 02-22 00:14:47.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3162 02-22 00:14:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[3163 02-22 00:14:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3164 02-22 00:14:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3165 02-22 00:14:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3166 02-22 00:14:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:13731063459844680921 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[3167 02-22 00:14:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:13731063459844680921 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[3168 02-22 00:14:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[3169 02-22 00:14:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[316a 02-22 00:14:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[316b 02-22 00:14:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[316c 02-22 00:14:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[316d 02-22 00:14:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[316e 02-22 00:14:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[316f 02-22 00:14:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[3170 02-22 00:14:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[3171 02-22 00:14:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3172 02-22 00:14:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3173 02-22 00:14:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3174 02-22 00:14:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3175 02-22 00:14:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s
[3176 02-22 00:14:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3177 02-22 00:14:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3178 02-22 00:14:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3179 02-22 00:14:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[317a 02-22 00:14:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 18 c8 63 68 9b 6e b1 e1 06 9c 70 c5 39 2c 67 |}..ch.n....p.9,g|
00000010 3f dc 29 95 1b b7 ce e1 90 e3 4f b2 58 15 91 6d |?.).......O.X..m|
[317b 02-22 00:14:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 ba 1b 3d bd ea 40 80 e1 3e 6e |0E.!....=..@..>n|
00000010 eb 8d 74 a1 08 b3 c6 a5 f2 6d 7d 71 75 ae 1c f0 |..t......m}qu...|
00000020 77 df 34 51 7e 02 20 7c d6 5e c0 62 3f 63 30 29 |w.4Q~. |.^.b?c0)|
00000030 49 01 ef 5f 83 23 5b 9e 46 40 db 4f ef 88 9e 4b |I.._.#[.F@.O...K|
00000040 d8 cf 3b 53 86 67 42 |..;S.gB|
[317c 02-22 00:14:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[317d 02-22 00:14:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 a9 48 1c e3 88 8c 1c 8c 04 be a7 |0D. Q.H.........|
00000010 c5 fa c3 16 9f 23 b5 86 63 2a 98 91 02 9b 29 6f |.....#..c*....)o|
00000020 55 27 d0 24 02 20 2d d5 29 c9 01 a4 25 f8 73 47 |U'.$. -.)...%.sG|
00000030 96 30 a5 a6 3b c7 8a fa 61 5f 4e 79 7d 86 ce d2 |.0..;...a_Ny}...|
00000040 1e cc 89 16 f0 25 |.....%|
[317e 02-22 00:14:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[317f 02-22 00:14:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[3180 02-22 00:14:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:47
[3181 02-22 00:14:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:47
[3182 02-22 00:14:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[3183 02-22 00:14:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3184 02-22 00:14:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3185 02-22 00:14:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3186 02-22 00:14:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3187 02-22 00:14:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3188 02-22 00:14:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3189 02-22 00:14:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[318a 02-22 00:14:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[318b 02-22 00:14:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[318c 02-22 00:14:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes
[318d 02-22 00:14:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[318e 02-22 00:14:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes
[318f 02-22 00:14:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3190 02-22 00:14:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes
[3191 02-22 00:14:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3192 02-22 00:14:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes
[3193 02-22 00:14:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3194 02-22 00:14:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes
[3195 02-22 00:14:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes
[3196 02-22 00:14:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3197 02-22 00:14:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes
[3198 02-22 00:14:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3199 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[319a 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[319b 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[319c 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[319d 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[319e 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[319f 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[31a0 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[31a1 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[31a2 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[31a3 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[31a4 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[31a5 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 cf 88 d1 d2 9c c0 ab bf 3c ae 87 17 ac 5e 09 |e........<....^.|
00000010 d4 2d 5a 68 53 03 d1 65 26 c1 f4 3e 33 ff d3 7c |.-ZhS..e&..>3..||
[31a6 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 81 30 e7 1b 3a e5 fe 76 18 cf |0E.!...0..:..v..|
00000010 32 45 ee 63 d3 bd d6 75 a0 0b ec 3e 83 78 de 6d |2E.c...u...>.x.m|
00000020 68 1e f9 af f0 02 20 14 b1 0d a6 3f 74 8a c8 6d |h..... ....?t..m|
00000030 d4 6e 78 85 d7 f4 24 63 bf 3b c2 61 f0 a6 9e f5 |.nx...$c.;.a....|
00000040 13 b5 46 04 9f b6 12 |..F....|
[31a7 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[31a8 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003775770 gate 1582330489318152000 evaluation starts
[31a9 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003775770 signed by 0 principal evaluation starts (used [false])
[31aa 02-22 00:14:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003775770 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[31ab 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[31ac 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003775770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[31ad 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003775770 principal evaluation fails
[31ae 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003775770 gate 1582330489318152000 evaluation fails
[31af 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[31b0 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[31b1 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[31b2 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 cf 88 d1 d2 9c c0 ab bf 3c ae 87 17 ac 5e 09 |e........<....^.|
00000010 d4 2d 5a 68 53 03 d1 65 26 c1 f4 3e 33 ff d3 7c |.-ZhS..e&..>3..||
[31b3 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 81 30 e7 1b 3a e5 fe 76 18 cf |0E.!...0..:..v..|
00000010 32 45 ee 63 d3 bd d6 75 a0 0b ec 3e 83 78 de 6d |2E.c...u...>.x.m|
00000020 68 1e f9 af f0 02 20 14 b1 0d a6 3f 74 8a c8 6d |h..... ....?t..m|
00000030 d4 6e 78 85 d7 f4 24 63 bf 3b c2 61 f0 a6 9e f5 |.nx...$c.;.a....|
00000040 13 b5 46 04 9f b6 12 |..F....|
[31b4 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[31b5 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a070 gate 1582330489323728500 evaluation starts
[31b6 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a070 signed by 0 principal evaluation starts (used [false])
[31b7 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a070 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[31b8 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a070 principal evaluation succeeds for identity 0
[31b9 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a070 gate 1582330489323728500 evaluation succeeds
[31ba 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[31bb 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[31bc 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[31bd 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[31be 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[31bf 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes]}
[31c0 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:46
[31c1 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:46
[31c2 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:45 , Envelope: 83 bytes, Signature: 69 bytes in aliveMembership
[31c3 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31c4 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31c5 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31c6 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[31c7 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31c8 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31c9 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31ca 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31cb 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31cc 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31cd 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31ce 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31cf 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[31d0 02-22 00:14:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31d1 02-22 00:14:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31d2 02-22 00:14:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[31d3 02-22 00:14:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[31d4 02-22 00:14:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31d5 02-22 00:14:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[31d6 02-22 00:14:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31d7 02-22 00:14:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[31d8 02-22 00:14:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31d9 02-22 00:14:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[31da 02-22 00:14:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31db 02-22 00:14:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[31dc 02-22 00:14:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[31dd 02-22 00:14:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA15100E1801
[31de 02-22 00:14:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C868FE065848A8268AC25AAE4894D64709363F0EA96E893E8459A437DE66EF98
[31df 02-22 00:14:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[31e0 02-22 00:14:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31e1 02-22 00:14:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31e2 02-22 00:14:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31e3 02-22 00:14:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31e4 02-22 00:14:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:14 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[31e5 02-22 00:14:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31e6 02-22 00:14:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31e7 02-22 00:14:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:14 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[31e8 02-22 00:14:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31e9 02-22 00:14:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[31ea 02-22 00:14:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[31eb 02-22 00:14:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[31ec 02-22 00:14:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[31ed 02-22 00:14:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[31ee 02-22 00:14:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[31ef 02-22 00:14:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[31f0 02-22 00:14:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[31f1 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[31f2 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[31f3 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[31f4 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 05 ea 77 1e 5f f8 56 ca 3f d8 33 3e 5a f1 4d |9..w._.V.?.3>Z.M|
00000010 db 70 10 d8 41 59 0c 38 e5 d4 cd 73 3f e2 d6 a3 |.p..AY.8...s?...|
[31f5 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 0d 35 4e ee 48 99 90 5b 3d d3 |0E.!...5N.H..[=.|
00000010 e0 58 48 c2 c1 cd d7 b9 95 c7 92 29 e4 d6 cf 6b |.XH........)...k|
00000020 ff f8 ee 5b 07 02 20 01 2d 7e 60 6b 70 a2 7d 6d |...[.. .-~`kp.}m|
00000030 10 07 a9 9c a9 67 04 d6 b3 54 f8 86 12 d3 5c c8 |.....g...T....\.|
00000040 50 19 2c fd 5f 60 6f |P.,._`o|
[31f6 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[31f7 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b5dc0 gate 1582330489415232000 evaluation starts
[31f8 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b5dc0 signed by 0 principal evaluation starts (used [false])
[31f9 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b5dc0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[31fa 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b5dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[31fb 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b5dc0 principal evaluation fails
[31fc 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b5dc0 gate 1582330489415232000 evaluation fails
[31fd 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[31fe 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[31ff 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3200 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 05 ea 77 1e 5f f8 56 ca 3f d8 33 3e 5a f1 4d |9..w._.V.?.3>Z.M|
00000010 db 70 10 d8 41 59 0c 38 e5 d4 cd 73 3f e2 d6 a3 |.p..AY.8...s?...|
[3201 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 0d 35 4e ee 48 99 90 5b 3d d3 |0E.!...5N.H..[=.|
00000010 e0 58 48 c2 c1 cd d7 b9 95 c7 92 29 e4 d6 cf 6b |.XH........)...k|
00000020 ff f8 ee 5b 07 02 20 01 2d 7e 60 6b 70 a2 7d 6d |...[.. .-~`kp.}m|
00000030 10 07 a9 9c a9 67 04 d6 b3 54 f8 86 12 d3 5c c8 |.....g...T....\.|
00000040 50 19 2c fd 5f 60 6f |P.,._`o|
[3202 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3203 02-22 00:14:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e46c0 gate 1582330489418796200 evaluation starts
[3204 02-22 00:14:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[3205 02-22 00:14:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[3206 02-22 00:14:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e46c0 signed by 0 principal evaluation starts (used [false])
[3207 02-22 00:14:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e46c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3208 02-22 00:14:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e46c0 principal evaluation succeeds for identity 0
[3209 02-22 00:14:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e46c0 gate 1582330489418796200 evaluation succeeds
[320a 02-22 00:14:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[320b 02-22 00:14:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[320c 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[320d 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[320e 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[320f 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes]}
[3210 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:44
[3211 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:44
[3212 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[3213 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3214 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3215 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3216 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[3218 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3217 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3219 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[321a 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[321b 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[321c 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[321d 02-22 00:14:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[321e 02-22 00:14:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[321f 02-22 00:14:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3220 02-22 00:14:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3221 02-22 00:14:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3222 02-22 00:14:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3223 02-22 00:14:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3224 02-22 00:14:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3225 02-22 00:14:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3226 02-22 00:14:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3227 02-22 00:14:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[3228 02-22 00:14:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3229 02-22 00:14:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes
[322a 02-22 00:14:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[322b 02-22 00:14:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15102B
[322c 02-22 00:14:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 73323BE532BDB9B6AD17BB62528F1E9C2D1D9E241F33AA3B36BE108ABB16975A
[322d 02-22 00:14:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[322e 02-22 00:14:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[322f 02-22 00:14:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[3230 02-22 00:14:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3231 02-22 00:14:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3232 02-22 00:14:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[3233 02-22 00:14:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3235 02-22 00:14:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3234 02-22 00:14:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3236 02-22 00:14:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3237 02-22 00:14:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3238 02-22 00:14:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3239 02-22 00:14:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes
[323a 02-22 00:14:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[323b 02-22 00:14:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes
[323c 02-22 00:14:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[323d 02-22 00:14:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:3097774043885447524 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[323e 02-22 00:14:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:3097774043885447524 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[323f 02-22 00:14:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3240 02-22 00:14:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3241 02-22 00:14:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3242 02-22 00:14:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3243 02-22 00:14:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3244 02-22 00:14:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3245 02-22 00:14:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[3246 02-22 00:14:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3247 02-22 00:14:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[3248 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3249 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[324a 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[324b 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 53 ad ac 34 10 ed 15 af 60 ef 6f b0 ff 7e 59 |.S..4....`.o..~Y|
00000010 10 18 69 e3 95 89 2b 91 6e 26 1f 68 41 ab f2 48 |..i...+.n&.hA..H|
[324c 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 8d 2a 08 56 6e 6d db 63 8f ce d2 |0D. ..*.Vnm.c...|
00000010 a9 33 50 60 28 b1 32 21 0e 5d 69 78 c2 cc 2b 05 |.3P`(.2!.]ix..+.|
00000020 93 71 bc 18 02 20 4a 11 07 ff a6 38 ea 46 1b 45 |.q... J....8.F.E|
00000030 6b f3 37 4e fd a0 e3 04 c7 98 e1 44 65 e8 ac 22 |k.7N.......De.."|
00000040 16 50 29 e1 2e d2 |.P)...|
[324d 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[324e 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 4d 2a 24 35 cb 36 6d c9 2e ae d5 |0D. rM*$5.6m....|
00000010 a5 62 97 b7 0f a8 83 09 36 61 4a de d9 b1 27 ea |.b......6aJ...'.|
00000020 dc d7 6a 81 02 20 12 2d e5 31 bd 21 fe 06 31 39 |..j.. .-.1.!..19|
00000030 0f 01 0a 38 59 e4 6d 36 b9 9d da 59 ce 1a 79 75 |...8Y.m6...Y..yu|
00000040 6e 03 6f 33 0f ef |n.o3..|
[324f 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3250 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[3251 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:48
[3252 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:48
[3253 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[3254 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3255 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3256 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3257 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[3258 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3259 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[325a 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[325b 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[325c 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[325d 02-22 00:14:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[325e 02-22 00:14:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:9887714533430450395 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[325f 02-22 00:14:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:9887714533430450395 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3260 02-22 00:14:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[3261 02-22 00:14:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3262 02-22 00:14:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:10680888530818860512 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3263 02-22 00:14:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:10680888530818860512 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3264 02-22 00:14:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10680888530818860512 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3265 02-22 00:14:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3266 02-22 00:14:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3267 02-22 00:14:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3268 02-22 00:14:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3269 02-22 00:14:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[326a 02-22 00:14:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[326b 02-22 00:14:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[326c 02-22 00:14:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[326d 02-22 00:14:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[326e 02-22 00:14:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:254956670058484893 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[326f 02-22 00:14:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[3270 02-22 00:14:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:254956670058484893 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3271 02-22 00:14:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3272 02-22 00:14:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:937377985699148154 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[3273 02-22 00:14:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[3275 02-22 00:14:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2559363150607106945 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[3274 02-22 00:14:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:937377985699148154 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3276 02-22 00:14:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3277 02-22 00:14:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2559363150607106945 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3278 02-22 00:14:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3279 02-22 00:14:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 937377985699148154 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[327a 02-22 00:14:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 937377985699148154 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[327b 02-22 00:14:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[327c 02-22 00:14:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 254956670058484893 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[327d 02-22 00:14:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2559363150607106945 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[327e 02-22 00:14:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 254956670058484893 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[327f 02-22 00:14:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3280 02-22 00:14:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2559363150607106945 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[3281 02-22 00:14:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2559363150607106945 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[3282 02-22 00:14:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3283 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3284 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3285 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3286 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3287 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[3288 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3289 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[328a 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[328b 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[328c 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[328d 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[328e 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[328f 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c 5d 51 d2 e6 2b e9 e8 12 7c 01 8d c0 18 55 f6 |.]Q..+...|....U.|
00000010 93 8d 64 d7 c9 41 ac 08 5f dd cf 6d 05 e1 cb 80 |..d..A.._..m....|
[3290 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 58 53 04 a9 bf 08 a6 47 50 47 86 |0D. zXS.....GPG.|
00000010 df e2 ef a4 ff 77 1d 10 e1 af da 9e c5 9c 13 56 |.....w.........V|
00000020 54 58 69 18 02 20 31 89 ca 49 2a 55 a8 f7 01 6e |TXi.. 1..I*U...n|
00000030 89 f4 b8 83 ad ee e6 c9 fe 94 2f 98 45 ab 64 4c |........../.E.dL|
00000040 f7 46 fa e4 40 9b |.F..@.|
[3291 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3292 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a0e70 gate 1582330490487046400 evaluation starts
[3293 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a0e70 signed by 0 principal evaluation starts (used [false])
[3294 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a0e70 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3295 02-22 00:14:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a0e70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3297 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a0e70 principal evaluation fails
[3296 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3298 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a0e70 gate 1582330490487046400 evaluation fails
[3299 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[329a 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[329b 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[329c 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c 5d 51 d2 e6 2b e9 e8 12 7c 01 8d c0 18 55 f6 |.]Q..+...|....U.|
00000010 93 8d 64 d7 c9 41 ac 08 5f dd cf 6d 05 e1 cb 80 |..d..A.._..m....|
[329d 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 58 53 04 a9 bf 08 a6 47 50 47 86 |0D. zXS.....GPG.|
00000010 df e2 ef a4 ff 77 1d 10 e1 af da 9e c5 9c 13 56 |.....w.........V|
00000020 54 58 69 18 02 20 31 89 ca 49 2a 55 a8 f7 01 6e |TXi.. 1..I*U...n|
00000030 89 f4 b8 83 ad ee e6 c9 fe 94 2f 98 45 ab 64 4c |........../.E.dL|
00000040 f7 46 fa e4 40 9b |.F..@.|
[329e 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[329f 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a17a0 gate 1582330490495705800 evaluation starts
[32a0 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a17a0 signed by 0 principal evaluation starts (used [false])
[32a1 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a17a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[32a2 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a17a0 principal evaluation succeeds for identity 0
[32a3 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a17a0 gate 1582330490495705800 evaluation succeeds
[32a4 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[32a5 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[32a6 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[32a7 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[32a8 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes
[32a9 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes]}
[32aa 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:47
[32ab 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:47
[32ac 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[32ad 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[32ae 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[32af 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[32b0 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[32b1 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[32b2 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[32b3 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[32b4 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[32b5 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[32b6 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[32b7 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[32b8 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[32b9 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 80 6d 12 5c a0 66 ec 1b 74 a5 fa 60 3d 1c 75 |..m.\.f..t..`=.u|
00000010 70 6d 23 6d 0a b5 f7 51 8a d6 4f 24 80 e3 17 c1 |pm#m...Q..O$....|
[32ba 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0c b0 12 b0 0d c3 25 18 21 f6 79 40 |0D. ......%.!.y@|
00000010 37 a2 b5 0d 71 7b e4 cf 21 32 0b 8f ae 83 2a f6 |7...q{..!2....*.|
00000020 58 ac 62 f0 02 20 31 c5 ac 7a 53 ae 34 ce f5 7c |X.b.. 1..zS.4..||
00000030 28 06 30 86 16 19 b5 00 1e bb e4 9f 54 11 e4 7d |(.0.........T..}|
00000040 96 b9 6b 68 69 f8 |..khi.|
[32bb 02-22 00:14:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[32be 02-22 00:14:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b5b70 gate 1582330490504798100 evaluation starts
[32bf 02-22 00:14:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b5b70 signed by 0 principal evaluation starts (used [false])
[32c0 02-22 00:14:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b5b70 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[32c1 02-22 00:14:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b5b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[32c2 02-22 00:14:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b5b70 principal evaluation fails
[32c3 02-22 00:14:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b5b70 gate 1582330490504798100 evaluation fails
[32c4 02-22 00:14:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[32c5 02-22 00:14:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[32c6 02-22 00:14:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[32bc 02-22 00:14:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[32bd 02-22 00:14:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[32c7 02-22 00:14:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 80 6d 12 5c a0 66 ec 1b 74 a5 fa 60 3d 1c 75 |..m.\.f..t..`=.u|
00000010 70 6d 23 6d 0a b5 f7 51 8a d6 4f 24 80 e3 17 c1 |pm#m...Q..O$....|
[32c8 02-22 00:14:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[32c9 02-22 00:14:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0c b0 12 b0 0d c3 25 18 21 f6 79 40 |0D. ......%.!.y@|
00000010 37 a2 b5 0d 71 7b e4 cf 21 32 0b 8f ae 83 2a f6 |7...q{..!2....*.|
00000020 58 ac 62 f0 02 20 31 c5 ac 7a 53 ae 34 ce f5 7c |X.b.. 1..zS.4..||
00000030 28 06 30 86 16 19 b5 00 1e bb e4 9f 54 11 e4 7d |(.0.........T..}|
00000040 96 b9 6b 68 69 f8 |..khi.|
[32ca 02-22 00:14:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[32cc 02-22 00:14:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d0470 gate 1582330490517078200 evaluation starts
[32cb 02-22 00:14:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[32cd 02-22 00:14:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d0470 signed by 0 principal evaluation starts (used [false])
[32ce 02-22 00:14:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[32cf 02-22 00:14:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d0470 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[32d1 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d0470 principal evaluation succeeds for identity 0
[32d2 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d0470 gate 1582330490517078200 evaluation succeeds
[32d3 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[32d0 02-22 00:14:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[32d4 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[32d5 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[32d6 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[32d7 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[32d8 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[32d9 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[32da 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes
[32db 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes]}
[32dc 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:45
[32dd 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:45
[32de 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[32df 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[32e0 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[32e1 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[32e2 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[32e3 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[32e4 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[32e5 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[32e6 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[32e8 02-22 00:14:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[32e7 02-22 00:14:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15102C
[32ea 02-22 00:14:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7D778E0DF2941376AAC34D5013B509D92196C16ED0B7BBCBF74D7D047E7F0B18
[32e9 02-22 00:14:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[32eb 02-22 00:14:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[32ec 02-22 00:14:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[32ed 02-22 00:14:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[32ee 02-22 00:14:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[32ef 02-22 00:14:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[32f0 02-22 00:14:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[32f1 02-22 00:14:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[32f2 02-22 00:14:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[32f3 02-22 00:14:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[32f4 02-22 00:14:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[32f5 02-22 00:14:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[32f6 02-22 00:14:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[32f7 02-22 00:14:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[32f8 02-22 00:14:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[32f9 02-22 00:14:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[32fa 02-22 00:14:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[32fb 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[32fc 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[32fd 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[32fe 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[32ff 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3300 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3301 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3302 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3303 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3304 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 80 6d 12 5c a0 66 ec 1b 74 a5 fa 60 3d 1c 75 |..m.\.f..t..`=.u|
00000010 70 6d 23 6d 0a b5 f7 51 8a d6 4f 24 80 e3 17 c1 |pm#m...Q..O$....|
[3305 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0c b0 12 b0 0d c3 25 18 21 f6 79 40 |0D. ......%.!.y@|
00000010 37 a2 b5 0d 71 7b e4 cf 21 32 0b 8f ae 83 2a f6 |7...q{..!2....*.|
00000020 58 ac 62 f0 02 20 31 c5 ac 7a 53 ae 34 ce f5 7c |X.b.. 1..zS.4..||
00000030 28 06 30 86 16 19 b5 00 1e bb e4 9f 54 11 e4 7d |(.0.........T..}|
00000040 96 b9 6b 68 69 f8 |..khi.|
[3306 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3307 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391aae0 gate 1582330490575198200 evaluation starts
[3308 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391aae0 signed by 0 principal evaluation starts (used [false])
[3309 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391aae0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[330a 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391aae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[330b 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391aae0 principal evaluation fails
[330c 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391aae0 gate 1582330490575198200 evaluation fails
[330d 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[330f 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[330e 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3310 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3311 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 80 6d 12 5c a0 66 ec 1b 74 a5 fa 60 3d 1c 75 |..m.\.f..t..`=.u|
00000010 70 6d 23 6d 0a b5 f7 51 8a d6 4f 24 80 e3 17 c1 |pm#m...Q..O$....|
[3312 02-22 00:14:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0c b0 12 b0 0d c3 25 18 21 f6 79 40 |0D. ......%.!.y@|
00000010 37 a2 b5 0d 71 7b e4 cf 21 32 0b 8f ae 83 2a f6 |7...q{..!2....*.|
00000020 58 ac 62 f0 02 20 31 c5 ac 7a 53 ae 34 ce f5 7c |X.b.. 1..zS.4..||
00000030 28 06 30 86 16 19 b5 00 1e bb e4 9f 54 11 e4 7d |(.0.........T..}|
00000040 96 b9 6b 68 69 f8 |..khi.|
[3313 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3314 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391b3e0 gate 1582330490581002700 evaluation starts
[3315 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391b3e0 signed by 0 principal evaluation starts (used [false])
[3316 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391b3e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3317 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391b3e0 principal evaluation succeeds for identity 0
[3318 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391b3e0 gate 1582330490581002700 evaluation succeeds
[3319 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[331a 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[331b 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[331c 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[331d 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes
[331e 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[331f 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[3320 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 77 8e 0d f2 94 13 76 aa c3 4d 50 13 b5 09 d9 |}w.....v..MP....|
00000010 21 96 c1 6e d0 b7 bb cb f7 4d 7d 04 7e 7f 0b 18 |!..n.....M}.~...|
[3321 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c e4 28 a2 90 12 0d f6 79 3d 95 1b |0D. l.(.....y=..|
00000010 d1 01 0d 75 9a 2f b9 d4 c3 7c fb 4c 13 3f 1b f4 |...u./...|.L.?..|
00000020 b1 ce e1 d7 02 20 5b 44 2c ca c6 54 cb 35 d4 45 |..... [D,..T.5.E|
00000030 fc 2a a7 9a a0 8e 55 5a 3d d6 8b 5f fd f8 ef 2d |.*....UZ=.._...-|
00000040 fa ae 84 40 17 49 |...@.I|
[3322 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes
[3323 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes
[3324 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3325 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[3326 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 53 ad ac 34 10 ed 15 af 60 ef 6f b0 ff 7e 59 |.S..4....`.o..~Y|
00000010 10 18 69 e3 95 89 2b 91 6e 26 1f 68 41 ab f2 48 |..i...+.n&.hA..H|
[3327 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 8d 2a 08 56 6e 6d db 63 8f ce d2 |0D. ..*.Vnm.c...|
00000010 a9 33 50 60 28 b1 32 21 0e 5d 69 78 c2 cc 2b 05 |.3P`(.2!.]ix..+.|
00000020 93 71 bc 18 02 20 4a 11 07 ff a6 38 ea 46 1b 45 |.q... J....8.F.E|
00000030 6b f3 37 4e fd a0 e3 04 c7 98 e1 44 65 e8 ac 22 |k.7N.......De.."|
00000040 16 50 29 e1 2e d2 |.P)...|
[3328 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[3329 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[332a 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[332b 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[332c 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[332d 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[332e 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[332f 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 77 8e 0d f2 94 13 76 aa c3 4d 50 13 b5 09 d9 |}w.....v..MP....|
00000010 21 96 c1 6e d0 b7 bb cb f7 4d 7d 04 7e 7f 0b 18 |!..n.....M}.~...|
[3330 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c e4 28 a2 90 12 0d f6 79 3d 95 1b |0D. l.(.....y=..|
00000010 d1 01 0d 75 9a 2f b9 d4 c3 7c fb 4c 13 3f 1b f4 |...u./...|.L.?..|
00000020 b1 ce e1 d7 02 20 5b 44 2c ca c6 54 cb 35 d4 45 |..... [D,..T.5.E|
00000030 fc 2a a7 9a a0 8e 55 5a 3d d6 8b 5f fd f8 ef 2d |.*....UZ=.._...-|
00000040 fa ae 84 40 17 49 |...@.I|
[3331 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[3332 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec ef 03 35 6c 61 15 5c 44 b7 b9 |0E.!....5la.\D..|
00000010 06 2a a3 53 51 19 64 b8 ab 84 9c 8e 79 e9 49 52 |.*.SQ.d.....y.IR|
00000020 58 21 19 fa 64 02 20 5e 6a 8f c1 74 05 f5 9d ed |X!..d. ^j..t....|
00000030 b5 13 9a a4 4a c7 54 b1 6f 4e 9d 2e eb 25 9a e2 |....J.T.oN...%..|
00000040 ba 6b 68 dd d0 c6 35 |.kh...5|
[3333 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3334 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3335 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3336 02-22 00:14:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3337 02-22 00:14:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[3338 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[3339 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[333a 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[333b 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[333c 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[333d 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[333e 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[333f 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3340 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3341 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c 5d 51 d2 e6 2b e9 e8 12 7c 01 8d c0 18 55 f6 |.]Q..+...|....U.|
00000010 93 8d 64 d7 c9 41 ac 08 5f dd cf 6d 05 e1 cb 80 |..d..A.._..m....|
[3342 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 58 53 04 a9 bf 08 a6 47 50 47 86 |0D. zXS.....GPG.|
00000010 df e2 ef a4 ff 77 1d 10 e1 af da 9e c5 9c 13 56 |.....w.........V|
00000020 54 58 69 18 02 20 31 89 ca 49 2a 55 a8 f7 01 6e |TXi.. 1..I*U...n|
00000030 89 f4 b8 83 ad ee e6 c9 fe 94 2f 98 45 ab 64 4c |........../.E.dL|
00000040 f7 46 fa e4 40 9b |.F..@.|
[3343 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3344 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00396b100 gate 1582330490615540600 evaluation starts
[3345 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00396b100 signed by 0 principal evaluation starts (used [false])
[3346 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00396b100 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3347 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00396b100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3348 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00396b100 principal evaluation fails
[3349 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00396b100 gate 1582330490615540600 evaluation fails
[334a 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[334b 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[334c 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[334d 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c 5d 51 d2 e6 2b e9 e8 12 7c 01 8d c0 18 55 f6 |.]Q..+...|....U.|
00000010 93 8d 64 d7 c9 41 ac 08 5f dd cf 6d 05 e1 cb 80 |..d..A.._..m....|
[334e 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 58 53 04 a9 bf 08 a6 47 50 47 86 |0D. zXS.....GPG.|
00000010 df e2 ef a4 ff 77 1d 10 e1 af da 9e c5 9c 13 56 |.....w.........V|
00000020 54 58 69 18 02 20 31 89 ca 49 2a 55 a8 f7 01 6e |TXi.. 1..I*U...n|
00000030 89 f4 b8 83 ad ee e6 c9 fe 94 2f 98 45 ab 64 4c |........../.E.dL|
00000040 f7 46 fa e4 40 9b |.F..@.|
[334f 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3350 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00396ba00 gate 1582330490619947800 evaluation starts
[3351 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00396ba00 signed by 0 principal evaluation starts (used [false])
[3352 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00396ba00 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3353 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00396ba00 principal evaluation succeeds for identity 0
[3355 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00396ba00 gate 1582330490619947800 evaluation succeeds
[3356 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3357 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3358 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3359 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[335a 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes
[335b 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[335c 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[335d 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 77 8e 0d f2 94 13 76 aa c3 4d 50 13 b5 09 d9 |}w.....v..MP....|
00000010 21 96 c1 6e d0 b7 bb cb f7 4d 7d 04 7e 7f 0b 18 |!..n.....M}.~...|
[335e 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c e4 28 a2 90 12 0d f6 79 3d 95 1b |0D. l.(.....y=..|
00000010 d1 01 0d 75 9a 2f b9 d4 c3 7c fb 4c 13 3f 1b f4 |...u./...|.L.?..|
00000020 b1 ce e1 d7 02 20 5b 44 2c ca c6 54 cb 35 d4 45 |..... [D,..T.5.E|
00000030 fc 2a a7 9a a0 8e 55 5a 3d d6 8b 5f fd f8 ef 2d |.*....UZ=.._...-|
00000040 fa ae 84 40 17 49 |...@.I|
[335f 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes
[3360 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes
[3361 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3362 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[3363 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 53 ad ac 34 10 ed 15 af 60 ef 6f b0 ff 7e 59 |.S..4....`.o..~Y|
00000010 10 18 69 e3 95 89 2b 91 6e 26 1f 68 41 ab f2 48 |..i...+.n&.hA..H|
[3364 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 8d 2a 08 56 6e 6d db 63 8f ce d2 |0D. ..*.Vnm.c...|
00000010 a9 33 50 60 28 b1 32 21 0e 5d 69 78 c2 cc 2b 05 |.3P`(.2!.]ix..+.|
00000020 93 71 bc 18 02 20 4a 11 07 ff a6 38 ea 46 1b 45 |.q... J....8.F.E|
00000030 6b f3 37 4e fd a0 e3 04 c7 98 e1 44 65 e8 ac 22 |k.7N.......De.."|
00000040 16 50 29 e1 2e d2 |.P)...|
[3365 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[3366 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3367 02-22 00:14:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3354 02-22 00:14:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3368 02-22 00:14:51.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3369 02-22 00:14:51.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[336a 02-22 00:14:51.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[336b 02-22 00:14:51.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[336c 02-22 00:14:51.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[336d 02-22 00:14:51.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[336e 02-22 00:14:51.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[336f 02-22 00:14:51.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[3370 02-22 00:14:51.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3371 02-22 00:14:51.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3372 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[3373 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[3374 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3375 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[3376 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[3377 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3378 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3379 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[337a 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[337b 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[337c 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[337d 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[337e 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[337f 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3380 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3381 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3382 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f0300 gate 1582330491086952900 evaluation starts
[3383 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f0300 signed by 0 principal evaluation starts (used [false])
[3384 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f0300 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3385 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f0300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3386 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f0300 principal evaluation fails
[3387 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f0300 gate 1582330491086952900 evaluation fails
[3388 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3389 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[338a 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[338b 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[338c 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[338d 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[338e 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f0c00 gate 1582330491088928100 evaluation starts
[338f 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f0c00 signed by 0 principal evaluation starts (used [false])
[3390 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f0c00 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3391 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f0c00 principal evaluation succeeds for identity 0
[3392 02-22 00:14:51.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f0c00 gate 1582330491088928100 evaluation succeeds
[3393 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3394 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3395 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3396 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3397 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3398 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3399 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[339a 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[339b 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[339c 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[339d 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[339e 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[339f 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[33a0 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[33a1 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[33a2 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a16660 gate 1582330491094503800 evaluation starts
[33a3 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a16660 signed by 0 principal evaluation starts (used [false])
[33a4 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a16660 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[33a5 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a16660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[33a6 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a16660 principal evaluation fails
[33a7 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a16660 gate 1582330491094503800 evaluation fails
[33a8 02-22 00:14:51.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[33a9 02-22 00:14:51.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[33aa 02-22 00:14:51.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[33ab 02-22 00:14:51.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[33ac 02-22 00:14:51.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[33ad 02-22 00:14:51.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[33ae 02-22 00:14:51.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a16f60 gate 1582330491102761300 evaluation starts
[33af 02-22 00:14:51.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a16f60 signed by 0 principal evaluation starts (used [false])
[33b0 02-22 00:14:51.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a16f60 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[33b1 02-22 00:14:51.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a16f60 principal evaluation succeeds for identity 0
[33b2 02-22 00:14:51.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a16f60 gate 1582330491102761300 evaluation succeeds
[33b3 02-22 00:14:51.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[33b4 02-22 00:14:51.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[33b5 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[33b6 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[33b7 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33b8 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[33b9 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[33ba 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[33bb 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[33bc 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[33bd 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[33be 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[33bf 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[33c0 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[33c1 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[33c2 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[33c3 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[33c4 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[33c5 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d7e0 gate 1582330491125780000 evaluation starts
[33c6 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d7e0 signed by 0 principal evaluation starts (used [false])
[33c7 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d7e0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[33c8 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d7e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[33c9 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d7e0 principal evaluation fails
[33ca 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d7e0 gate 1582330491125780000 evaluation fails
[33cb 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[33cc 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[33cd 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[33ce 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[33cf 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[33d0 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[33d1 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630c0e0 gate 1582330491127263900 evaluation starts
[33d2 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630c0e0 signed by 0 principal evaluation starts (used [false])
[33d3 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630c0e0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[33d4 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630c0e0 principal evaluation succeeds for identity 0
[33d5 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630c0e0 gate 1582330491127263900 evaluation succeeds
[33d6 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[33d7 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[33d8 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[33d9 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[33da 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[33db 02-22 00:14:51.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[33dc 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[33dd 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[33de 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[33df 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[33e0 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[33e1 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[33e2 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[33e3 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[33e4 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[33e5 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[33e6 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[33e7 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2200 gate 1582330491133987200 evaluation starts
[33e8 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2200 signed by 0 principal evaluation starts (used [false])
[33e9 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2200 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[33ea 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[33eb 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2200 principal evaluation fails
[33ec 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2200 gate 1582330491133987200 evaluation fails
[33ed 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[33ee 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[33ef 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[33f0 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[33f1 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[33f2 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[33f3 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2b00 gate 1582330491137599800 evaluation starts
[33f4 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2b00 signed by 0 principal evaluation starts (used [false])
[33f5 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2b00 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[33f6 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2b00 principal evaluation succeeds for identity 0
[33f7 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2b00 gate 1582330491137599800 evaluation succeeds
[33f8 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[33f9 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[33fa 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[33fb 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[33fc 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[33fd 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[33fe 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[33ff 02-22 00:14:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3400 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3401 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3402 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3403 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3404 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3405 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3406 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3407 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3408 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3409 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[340a 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[340b 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[340c 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030113f0 gate 1582330491144009000 evaluation starts
[340d 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030113f0 signed by 0 principal evaluation starts (used [false])
[340e 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030113f0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[340f 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030113f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3410 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030113f0 principal evaluation fails
[3411 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030113f0 gate 1582330491144009000 evaluation fails
[3412 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3413 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3414 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3415 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3416 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3417 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3418 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003011cf0 gate 1582330491147011100 evaluation starts
[3419 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003011cf0 signed by 0 principal evaluation starts (used [false])
[341a 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003011cf0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[341b 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003011cf0 principal evaluation succeeds for identity 0
[341c 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003011cf0 gate 1582330491147011100 evaluation succeeds
[341d 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[341e 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[341f 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3420 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3421 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[3422 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[3423 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[3424 02-22 00:14:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[3425 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3426 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3427 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3428 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3429 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[342a 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[342b 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[342c 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[342d 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[342e 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[342f 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3430 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc770 gate 1582330491153228900 evaluation starts
[3431 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc770 signed by 0 principal evaluation starts (used [false])
[3432 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc770 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3433 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3434 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc770 principal evaluation fails
[3435 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc770 gate 1582330491153228900 evaluation fails
[3436 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3437 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3438 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3439 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[343a 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[343b 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[343c 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd190 gate 1582330491156465600 evaluation starts
[343d 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd190 signed by 0 principal evaluation starts (used [false])
[343e 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd190 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[343f 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd190 principal evaluation succeeds for identity 0
[3440 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd190 gate 1582330491156465600 evaluation succeeds
[3441 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3442 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3443 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3444 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3445 02-22 00:14:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3446 02-22 00:14:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3447 02-22 00:14:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3448 02-22 00:14:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[3449 02-22 00:14:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[344a 02-22 00:14:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[344b 02-22 00:14:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12807366789301115564 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[344c 02-22 00:14:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12807366789301115564 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[344d 02-22 00:14:51.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[344e 02-22 00:14:51.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12807366789301115564 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[344f 02-22 00:14:51.18 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12807366789301115564 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[3450 02-22 00:14:51.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3451 02-22 00:14:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[3452 02-22 00:14:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3453 02-22 00:14:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3454 02-22 00:14:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3455 02-22 00:14:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7222699683814337781 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[3456 02-22 00:14:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7222699683814337781 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[3457 02-22 00:14:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[3458 02-22 00:14:51.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3459 02-22 00:14:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[345a 02-22 00:14:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[345b 02-22 00:14:51.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[345c 02-22 00:14:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[345d 02-22 00:14:52.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[345e 02-22 00:14:52.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[345f 02-22 00:14:52.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[3460 02-22 00:14:52.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3461 02-22 00:14:52.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3462 02-22 00:14:52.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3463 02-22 00:14:52.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3464 02-22 00:14:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:10535165583914117924 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3465 02-22 00:14:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10535165583914117924 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3466 02-22 00:14:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3467 02-22 00:14:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3468 02-22 00:14:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3469 02-22 00:14:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[346a 02-22 00:14:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[346b 02-22 00:14:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[346c 02-22 00:14:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[346d 02-22 00:14:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[346e 02-22 00:14:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[346f 02-22 00:14:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3470 02-22 00:14:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3471 02-22 00:14:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[3472 02-22 00:14:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c d8 b7 a4 71 a3 f7 dc a2 49 7e c5 ce 30 03 a0 |....q....I~..0..|
00000010 9b da 5b 10 68 40 6f 48 3e 12 ed 4b b2 2d 74 4b |..[.h@oH>..K.-tK|
[3473 02-22 00:14:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 3a 1a 67 68 0b a4 e4 17 bf 59 d1 |0D. }:.gh.....Y.|
00000010 60 b6 f2 60 86 8c e3 44 60 1b 5d 73 d1 77 68 4b |`..`...D`.]s.whK|
00000020 bc 05 aa 46 02 20 3c b3 7c 31 e3 f3 ce fa 6d e3 |...F. <.|1....m.|
00000030 b9 7f af d0 df f5 a4 ca 39 62 c3 50 3b e6 8b be |........9b.P;...|
00000040 e4 d5 4c 5f 6e 3f |..L_n?|
[3474 02-22 00:14:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[3475 02-22 00:14:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c e9 19 f6 64 63 36 ac 2e 58 b3 69 |0D. ,...dc6..X.i|
00000010 15 08 d4 22 4e bf 14 ae 02 b2 10 85 fb 72 6f d1 |..."N........ro.|
00000020 e0 a0 3e 3f 02 20 23 d4 69 70 99 d6 f8 a5 ad 33 |..>?. #.ip.....3|
00000030 6a 55 0b eb da c7 6b 08 99 22 c2 43 64 ca 3a 72 |jU....k..".Cd.:r|
00000040 78 04 8f db 73 9a |x...s.|
[3476 02-22 00:14:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3477 02-22 00:14:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[3478 02-22 00:14:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:49
[3479 02-22 00:14:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:49
[347a 02-22 00:14:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[347b 02-22 00:14:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[347c 02-22 00:14:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[347d 02-22 00:14:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[347e 02-22 00:14:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[347f 02-22 00:14:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3480 02-22 00:14:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3481 02-22 00:14:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3482 02-22 00:14:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3483 02-22 00:14:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3484 02-22 00:14:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3485 02-22 00:14:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3486 02-22 00:14:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3487 02-22 00:14:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3488 02-22 00:14:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3489 02-22 00:14:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[348a 02-22 00:14:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[348b 02-22 00:14:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[348d 02-22 00:14:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[348c 02-22 00:14:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[348e 02-22 00:14:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[348f 02-22 00:14:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3490 02-22 00:14:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3491 02-22 00:14:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[3492 02-22 00:14:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3493 02-22 00:14:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[3494 02-22 00:14:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[3495 02-22 00:14:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 14 fe 41 36 fe fe 93 78 de 2f 5a fe ac 53 69 |E..A6...x./Z..Si|
00000010 e4 f8 ac e9 10 76 dd 5b d8 cd 92 e4 6e 11 5e 21 |.....v.[....n.^!|
[3496 02-22 00:14:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 60 50 c1 2f 28 e9 b9 b6 5d 4d |0E.!..`P./(...]M|
00000010 93 ce e2 31 ab 67 03 ef 0d 27 32 bf 77 f9 0b 65 |...1.g...'2.w..e|
00000020 d1 d1 16 32 b7 02 20 12 9c 11 ed 88 1c 0c 40 1d |...2.. .......@.|
00000030 71 d1 4b ad c5 aa 34 87 a1 e6 11 9d dc c2 6d df |q.K...4.......m.|
00000040 f0 c1 c3 17 29 fa 0b |....)..|
[3497 02-22 00:14:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[3498 02-22 00:14:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[3499 02-22 00:14:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[349a 02-22 00:14:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 03 9d 3c 58 6e 39 f0 85 52 fe |0E.!....<Xn9..R.|
00000010 fa 7c c1 2f a1 f9 d4 a3 11 65 06 fb d4 1d 14 98 |.|./.....e......|
00000020 5b 5d 7a 8c c1 02 20 6e e7 42 ef 18 2f da f3 44 |[]z... n.B../..D|
00000030 5f 82 96 a5 74 91 66 10 9e 1f ab 94 3d d9 b9 68 |_...t.f.....=..h|
00000040 5c 1f ee 9b 45 e9 0a |\...E..|
[349b 02-22 00:14:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[349c 02-22 00:14:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[349d 02-22 00:14:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:50
[349e 02-22 00:14:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:50
[349f 02-22 00:14:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[34a0 02-22 00:14:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34a1 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34a2 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34a3 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[34a4 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34a5 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34a8 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers
[34a9 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[34aa 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[34a7 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34a6 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[34ab 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34ac 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[34ad 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34ae 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[34af 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[34b0 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[34b1 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[34b2 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[34b3 02-22 00:14:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[34b4 02-22 00:14:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 5d 87 4d 66 7c d1 4d 37 52 b5 00 76 41 b2 d5 |>].Mf|.M7R..vA..|
00000010 ef 71 fc 68 9e 26 c9 0f bb e6 f4 9d 1b 0b 2f 61 |.q.h.&......../a|
[34b5 02-22 00:14:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 3b ec 52 1e 7c 11 49 46 ae 53 67 |0D. F;.R.|.IF.Sg|
00000010 62 a2 9b a8 ad bd 85 4b f8 68 e9 91 00 0d 3c d2 |b......K.h....<.|
00000020 a9 54 06 a7 02 20 1e 28 f6 4b 20 54 76 1a 1b 96 |.T... .(.K Tv...|
00000030 f6 fd 5d e4 3c 26 16 e2 74 0a e6 52 bb 6c 84 87 |..].<&..t..R.l..|
00000040 19 ea 59 d9 e8 96 |..Y...|
[34b6 02-22 00:14:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[34b7 02-22 00:14:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a195b0 gate 1582330494337161400 evaluation starts
[34b8 02-22 00:14:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a195b0 signed by 0 principal evaluation starts (used [false])
[34b9 02-22 00:14:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a195b0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[34ba 02-22 00:14:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a195b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[34bb 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a195b0 principal evaluation fails
[34bc 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a195b0 gate 1582330494337161400 evaluation fails
[34bd 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[34be 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[34bf 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[34c0 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 5d 87 4d 66 7c d1 4d 37 52 b5 00 76 41 b2 d5 |>].Mf|.M7R..vA..|
00000010 ef 71 fc 68 9e 26 c9 0f bb e6 f4 9d 1b 0b 2f 61 |.q.h.&......../a|
[34c1 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 3b ec 52 1e 7c 11 49 46 ae 53 67 |0D. F;.R.|.IF.Sg|
00000010 62 a2 9b a8 ad bd 85 4b f8 68 e9 91 00 0d 3c d2 |b......K.h....<.|
00000020 a9 54 06 a7 02 20 1e 28 f6 4b 20 54 76 1a 1b 96 |.T... .(.K Tv...|
00000030 f6 fd 5d e4 3c 26 16 e2 74 0a e6 52 bb 6c 84 87 |..].<&..t..R.l..|
00000040 19 ea 59 d9 e8 96 |..Y...|
[34c2 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[34c3 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a19ec0 gate 1582330494343239000 evaluation starts
[34c4 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a19ec0 signed by 0 principal evaluation starts (used [false])
[34c5 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a19ec0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[34c6 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a19ec0 principal evaluation succeeds for identity 0
[34c7 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[34c8 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a19ec0 gate 1582330494343239000 evaluation succeeds
[34c9 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[34ca 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[34cb 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[34cc 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[34cd 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[34ce 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes]}
[34cf 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:48
[34d0 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:48
[34d1 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[34d2 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34d3 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34d4 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34d5 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[34d6 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34d7 02-22 00:14:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34d8 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:13539419526180033637 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[34d9 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13539419526180033637 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[34da 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[34db 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34dc 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[34dd 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34de 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[34df 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34e0 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34e1 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34e2 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34e3 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34e4 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34e5 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34e6 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[34e7 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34e8 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34ea 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[34eb 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[34ec 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34e9 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes
[34ed 02-22 00:14:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34ee 02-22 00:14:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:5564812024924037188 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[34ef 02-22 00:14:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:5564812024924037188 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[34f0 02-22 00:14:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:5564812024924037188 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[34f1 02-22 00:14:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34f2 02-22 00:14:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34f3 02-22 00:14:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34f4 02-22 00:14:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34f5 02-22 00:14:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34f6 02-22 00:14:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34f7 02-22 00:14:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[34f8 02-22 00:14:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[34f9 02-22 00:14:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[34fa 02-22 00:14:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[34fb 02-22 00:14:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA15100F1801
[34fc 02-22 00:14:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4978128C4AE227169A74E0945A4F90F2789B6B63BEF7B3C2D09BF3E34ABB827A
[34fd 02-22 00:14:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[34fe 02-22 00:14:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[34ff 02-22 00:14:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3500 02-22 00:14:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3501 02-22 00:14:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3502 02-22 00:14:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:15 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[3503 02-22 00:14:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3504 02-22 00:14:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3505 02-22 00:14:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:15 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[3506 02-22 00:14:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3507 02-22 00:14:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3508 02-22 00:14:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3509 02-22 00:14:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[350a 02-22 00:14:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[350b 02-22 00:14:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[350c 02-22 00:14:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[350d 02-22 00:14:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[350e 02-22 00:14:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[350f 02-22 00:14:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3510 02-22 00:14:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3511 02-22 00:14:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3512 02-22 00:14:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 6c 2e 9e ba 69 40 e6 f6 56 04 cd cf 91 13 78 |.l...i@..V.....x|
00000010 c2 fb 51 81 c4 39 b1 de 31 08 9b 79 f9 f9 16 dd |..Q..9..1..y....|
[3513 02-22 00:14:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e e4 2b f5 72 9d 91 27 b3 f4 cf |0E.!...+.r..'...|
00000010 bb 50 b4 21 b9 81 da 10 08 c7 40 90 1c 6f 4f ac |.P.!......@..oO.|
00000020 34 80 78 42 11 02 20 5a c2 82 5d cc 63 aa 84 f1 |4.xB.. Z..].c...|
00000030 74 71 60 bd a4 2c ce 80 d2 32 2a ea 48 b0 d3 7e |tq`..,...2*.H..~|
00000040 86 79 cb b2 40 6f 1c |.y..@o.|
[3514 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3515 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cc5e0 gate 1582330494410748700 evaluation starts
[3516 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cc5e0 signed by 0 principal evaluation starts (used [false])
[3517 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cc5e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3518 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cc5e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3519 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cc5e0 principal evaluation fails
[351a 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cc5e0 gate 1582330494410748700 evaluation fails
[351b 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[351c 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[351e 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[351f 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[351d 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:16675990106993646305 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[3521 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[3520 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 6c 2e 9e ba 69 40 e6 f6 56 04 cd cf 91 13 78 |.l...i@..V.....x|
00000010 c2 fb 51 81 c4 39 b1 de 31 08 9b 79 f9 f9 16 dd |..Q..9..1..y....|
[3522 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e e4 2b f5 72 9d 91 27 b3 f4 cf |0E.!...+.r..'...|
00000010 bb 50 b4 21 b9 81 da 10 08 c7 40 90 1c 6f 4f ac |.P.!......@..oO.|
00000020 34 80 78 42 11 02 20 5a c2 82 5d cc 63 aa 84 f1 |4.xB.. Z..].c...|
00000030 74 71 60 bd a4 2c ce 80 d2 32 2a ea 48 b0 d3 7e |tq`..,...2*.H..~|
00000040 86 79 cb b2 40 6f 1c |.y..@o.|
[3523 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:8737841289726536513 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[3524 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[3525 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:18009645966417501345 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[3526 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:18009645966417501345 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3527 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3528 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3529 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ccf70 gate 1582330494417027300 evaluation starts
[352a 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:16675990106993646305 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[352b 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[352c 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ccf70 signed by 0 principal evaluation starts (used [false])
[352d 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ccf70 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[352e 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ccf70 principal evaluation succeeds for identity 0
[352f 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:8737841289726536513 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3530 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3531 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ccf70 gate 1582330494417027300 evaluation succeeds
[3532 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3533 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3534 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3536 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3537 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3538 02-22 00:14:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes]}
[3539 02-22 00:14:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:46
[353a 02-22 00:14:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:46
[353b 02-22 00:14:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[353d 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[353e 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[353f 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[353c 02-22 00:14:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18009645966417501345 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[3540 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18009645966417501345 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[3541 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3535 02-22 00:14:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3542 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16675990106993646305 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[3544 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16675990106993646305 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[3543 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8737841289726536513 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[3545 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3546 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3547 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3549 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3548 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[354a 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[354b 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[354d 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[354c 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[354e 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8737841289726536513 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[354f 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8737841289726536513 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[3550 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3551 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3552 02-22 00:14:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3553 02-22 00:14:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3554 02-22 00:14:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3555 02-22 00:14:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3556 02-22 00:14:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3557 02-22 00:14:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3558 02-22 00:14:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3559 02-22 00:14:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[355a 02-22 00:14:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[355b 02-22 00:14:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[355c 02-22 00:14:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[355d 02-22 00:14:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[355e 02-22 00:14:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[355f 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3560 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3561 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3562 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3563 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[3564 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3565 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3566 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3567 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3568 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3569 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[356a 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[356b 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c 0f 8b 3f 57 a7 e6 c9 22 df 0e 84 48 89 5a fc |...?W..."...H.Z.|
00000010 f4 50 08 de 92 0a 0c 07 47 20 99 54 53 95 00 9b |.P......G .TS...|
[356c 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 b5 37 fe e5 5a 82 66 03 4c f9 f1 |0D. t.7..Z.f.L..|
00000010 7d ad 75 32 92 23 aa 83 b6 b7 7d 48 97 1d 97 c3 |}.u2.#....}H....|
00000020 e9 f6 a8 59 02 20 1a 00 0d ec 29 37 b7 3d 3d 6d |...Y. ....)7.==m|
00000030 63 29 ca 3a f0 c2 0a fc 2a c6 1d 25 07 74 b0 fb |c).:....*..%.t..|
00000040 fd 85 3a 21 72 de |..:!r.|
[356d 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[356e 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00016d230 gate 1582330494487429800 evaluation starts
[356f 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00016d230 signed by 0 principal evaluation starts (used [false])
[3570 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00016d230 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3571 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00016d230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3572 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00016d230 principal evaluation fails
[3573 02-22 00:14:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00016d230 gate 1582330494487429800 evaluation fails
[3574 02-22 00:14:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3575 02-22 00:14:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3576 02-22 00:14:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3577 02-22 00:14:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c 0f 8b 3f 57 a7 e6 c9 22 df 0e 84 48 89 5a fc |...?W..."...H.Z.|
00000010 f4 50 08 de 92 0a 0c 07 47 20 99 54 53 95 00 9b |.P......G .TS...|
[3578 02-22 00:14:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3579 02-22 00:14:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 b5 37 fe e5 5a 82 66 03 4c f9 f1 |0D. t.7..Z.f.L..|
00000010 7d ad 75 32 92 23 aa 83 b6 b7 7d 48 97 1d 97 c3 |}.u2.#....}H....|
00000020 e9 f6 a8 59 02 20 1a 00 0d ec 29 37 b7 3d 3d 6d |...Y. ....)7.==m|
00000030 63 29 ca 3a f0 c2 0a fc 2a c6 1d 25 07 74 b0 fb |c).:....*..%.t..|
00000040 fd 85 3a 21 72 de |..:!r.|
[357a 02-22 00:14:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[357b 02-22 00:14:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000210120 gate 1582330494502560400 evaluation starts
[357c 02-22 00:14:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000210120 signed by 0 principal evaluation starts (used [false])
[357d 02-22 00:14:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000210120 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[357e 02-22 00:14:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000210120 principal evaluation succeeds for identity 0
[357f 02-22 00:14:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000210120 gate 1582330494502560400 evaluation succeeds
[3580 02-22 00:14:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3581 02-22 00:14:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3582 02-22 00:14:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3583 02-22 00:14:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3584 02-22 00:14:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3585 02-22 00:14:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes]}
[3586 02-22 00:14:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:49
[3587 02-22 00:14:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:49
[3588 02-22 00:14:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[3589 02-22 00:14:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[358a 02-22 00:14:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[358b 02-22 00:14:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[358d 02-22 00:14:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[358f 02-22 00:14:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[3590 02-22 00:14:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3591 02-22 00:14:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[358c 02-22 00:14:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[358e 02-22 00:14:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3592 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3594 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3595 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3596 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3597 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3598 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 65 cd 6b 05 42 1a 9c 6e a7 db 8b f1 20 74 76 |.e.k.B..n.... tv|
00000010 f0 80 07 75 be bc 5a 01 01 b2 c3 15 24 91 22 51 |...u..Z.....$."Q|
[3599 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 3f b3 71 29 e3 39 7f c1 d9 6a fa |0D. .?.q).9...j.|
00000010 42 a9 e2 f1 94 38 45 22 7e 11 20 96 13 b6 1a fd |B....8E"~. .....|
00000020 04 a5 3c 85 02 20 38 93 7b 80 fa 17 54 33 14 ea |..<.. 8.{...T3..|
00000030 1e ec a8 15 f9 fe 41 ea b7 d7 68 aa 05 00 1c ce |......A...h.....|
00000040 a4 ef 88 09 a6 2b |.....+|
[3593 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[359a 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[359b 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[359c 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230750 gate 1582330494524659600 evaluation starts
[359d 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230750 signed by 0 principal evaluation starts (used [false])
[359e 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[359f 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230750 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[35a0 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[35a1 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[35a2 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230750 principal evaluation fails
[35a3 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[35a4 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230750 gate 1582330494524659600 evaluation fails
[35a5 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[35a6 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[35a7 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[35a8 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[35a9 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[35aa 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 65 cd 6b 05 42 1a 9c 6e a7 db 8b f1 20 74 76 |.e.k.B..n.... tv|
00000010 f0 80 07 75 be bc 5a 01 01 b2 c3 15 24 91 22 51 |...u..Z.....$."Q|
[35ab 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 3f b3 71 29 e3 39 7f c1 d9 6a fa |0D. .?.q).9...j.|
00000010 42 a9 e2 f1 94 38 45 22 7e 11 20 96 13 b6 1a fd |B....8E"~. .....|
00000020 04 a5 3c 85 02 20 38 93 7b 80 fa 17 54 33 14 ea |..<.. 8.{...T3..|
00000030 1e ec a8 15 f9 fe 41 ea b7 d7 68 aa 05 00 1c ce |......A...h.....|
00000040 a4 ef 88 09 a6 2b |.....+|
[35ac 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[35ad 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000231080 gate 1582330494525080900 evaluation starts
[35ae 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000231080 signed by 0 principal evaluation starts (used [false])
[35af 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000231080 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[35b0 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000231080 principal evaluation succeeds for identity 0
[35b1 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000231080 gate 1582330494525080900 evaluation succeeds
[35b2 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[35b3 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[35b4 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[35b5 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[35b6 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes
[35b7 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes]}
[35b8 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:47
[35b9 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:47
[35ba 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[35bb 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[35bc 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[35bd 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[35be 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[35bf 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[35c0 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[35c1 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[35c2 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[35c3 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[35c4 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[35c5 02-22 00:14:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[35c6 02-22 00:14:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15102D
[35c7 02-22 00:14:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E38A844A6700BA12BA4E16959895625801323A3A24FC1BB8F8B055ADE77715A8
[35c8 02-22 00:14:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[35c9 02-22 00:14:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[35ca 02-22 00:14:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[35cb 02-22 00:14:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[35cc 02-22 00:14:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[35cd 02-22 00:14:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[35ce 02-22 00:14:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[35cf 02-22 00:14:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[35d0 02-22 00:14:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[35d1 02-22 00:14:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[35d2 02-22 00:14:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[35d3 02-22 00:14:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[35d4 02-22 00:14:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[35d5 02-22 00:14:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[35d6 02-22 00:14:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[35d7 02-22 00:14:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[35d8 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[35d9 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[35da 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[35db 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 8a 84 4a 67 00 ba 12 ba 4e 16 95 98 95 62 58 |...Jg....N....bX|
00000010 01 32 3a 3a 24 fc 1b b8 f8 b0 55 ad e7 77 15 a8 |.2::$.....U..w..|
[35dc 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b ac df 72 79 cd 1a 2a ce f8 ac 8b |0D. k..ry..*....|
00000010 8e ed cf 42 7a f5 31 b5 d5 0b 9a 11 37 b7 00 f3 |...Bz.1.....7...|
00000020 ea 1c 43 67 02 20 79 f7 ea e0 84 99 25 ff c4 d4 |..Cg. y.....%...|
00000030 e0 50 bd bf a6 1c 1b c1 d5 41 a3 96 8d 6f 9b c5 |.P.......A...o..|
00000040 6b ac a5 4f 51 56 |k..OQV|
[35dd 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[35de 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6e 68 2b af cc 7a 44 9e d0 60 f3 d1 |0D. nh+..zD..`..|
00000010 2e 3e a2 fc 4f a6 b0 98 2b 47 ae 99 d0 34 e5 93 |.>..O...+G...4..|
00000020 63 59 25 6e 02 20 51 4b 52 79 3d b6 80 aa c7 1c |cY%n. QKRy=.....|
00000030 68 1c a9 c5 01 55 0e 7c 6b ba 5b 9a 22 5a ef 58 |h....U.|k.[."Z.X|
00000040 7d 4e f2 b3 6e f9 |}N..n.|
[35df 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[35e0 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[35e1 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[35e2 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[35e3 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[35e4 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[35e5 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[35e6 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[35e7 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[35e8 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[35e9 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[35ea 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[35eb 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[35ec 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 65 cd 6b 05 42 1a 9c 6e a7 db 8b f1 20 74 76 |.e.k.B..n.... tv|
00000010 f0 80 07 75 be bc 5a 01 01 b2 c3 15 24 91 22 51 |...u..Z.....$."Q|
[35ed 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 3f b3 71 29 e3 39 7f c1 d9 6a fa |0D. .?.q).9...j.|
00000010 42 a9 e2 f1 94 38 45 22 7e 11 20 96 13 b6 1a fd |B....8E"~. .....|
00000020 04 a5 3c 85 02 20 38 93 7b 80 fa 17 54 33 14 ea |..<.. 8.{...T3..|
00000030 1e ec a8 15 f9 fe 41 ea b7 d7 68 aa 05 00 1c ce |......A...h.....|
00000040 a4 ef 88 09 a6 2b |.....+|
[35ee 02-22 00:14:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[35ef 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e320 gate 1582330494590102700 evaluation starts
[35f0 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e320 signed by 0 principal evaluation starts (used [false])
[35f1 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e320 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[35f2 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[35f3 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e320 principal evaluation fails
[35f4 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e320 gate 1582330494590102700 evaluation fails
[35f5 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[35f6 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[35f7 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[35f8 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 65 cd 6b 05 42 1a 9c 6e a7 db 8b f1 20 74 76 |.e.k.B..n.... tv|
00000010 f0 80 07 75 be bc 5a 01 01 b2 c3 15 24 91 22 51 |...u..Z.....$."Q|
[35f9 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 3f b3 71 29 e3 39 7f c1 d9 6a fa |0D. .?.q).9...j.|
00000010 42 a9 e2 f1 94 38 45 22 7e 11 20 96 13 b6 1a fd |B....8E"~. .....|
00000020 04 a5 3c 85 02 20 38 93 7b 80 fa 17 54 33 14 ea |..<.. 8.{...T3..|
00000030 1e ec a8 15 f9 fe 41 ea b7 d7 68 aa 05 00 1c ce |......A...h.....|
00000040 a4 ef 88 09 a6 2b |.....+|
[35fa 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[35fb 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027ec70 gate 1582330494591116700 evaluation starts
[35fc 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027ec70 signed by 0 principal evaluation starts (used [false])
[35fd 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027ec70 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[35fe 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027ec70 principal evaluation succeeds for identity 0
[35ff 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027ec70 gate 1582330494591116700 evaluation succeeds
[3600 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3601 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3602 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3603 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3604 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes
[3605 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3606 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[3607 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 8a 84 4a 67 00 ba 12 ba 4e 16 95 98 95 62 58 |...Jg....N....bX|
00000010 01 32 3a 3a 24 fc 1b b8 f8 b0 55 ad e7 77 15 a8 |.2::$.....U..w..|
[3608 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b ac df 72 79 cd 1a 2a ce f8 ac 8b |0D. k..ry..*....|
00000010 8e ed cf 42 7a f5 31 b5 d5 0b 9a 11 37 b7 00 f3 |...Bz.1.....7...|
00000020 ea 1c 43 67 02 20 79 f7 ea e0 84 99 25 ff c4 d4 |..Cg. y.....%...|
00000030 e0 50 bd bf a6 1c 1b c1 d5 41 a3 96 8d 6f 9b c5 |.P.......A...o..|
00000040 6b ac a5 4f 51 56 |k..OQV|
[3609 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes
[360b 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes
[360c 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[360d 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[360e 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 14 fe 41 36 fe fe 93 78 de 2f 5a fe ac 53 69 |E..A6...x./Z..Si|
00000010 e4 f8 ac e9 10 76 dd 5b d8 cd 92 e4 6e 11 5e 21 |.....v.[....n.^!|
[360f 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 60 50 c1 2f 28 e9 b9 b6 5d 4d |0E.!..`P./(...]M|
00000010 93 ce e2 31 ab 67 03 ef 0d 27 32 bf 77 f9 0b 65 |...1.g...'2.w..e|
00000020 d1 d1 16 32 b7 02 20 12 9c 11 ed 88 1c 0c 40 1d |...2.. .......@.|
00000030 71 d1 4b ad c5 aa 34 87 a1 e6 11 9d dc c2 6d df |q.K...4.......m.|
00000040 f0 c1 c3 17 29 fa 0b |....)..|
[360a 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3610 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes
[3612 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3613 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3611 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3614 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3615 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3616 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[3617 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 8a 84 4a 67 00 ba 12 ba 4e 16 95 98 95 62 58 |...Jg....N....bX|
00000010 01 32 3a 3a 24 fc 1b b8 f8 b0 55 ad e7 77 15 a8 |.2::$.....U..w..|
[3618 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b ac df 72 79 cd 1a 2a ce f8 ac 8b |0D. k..ry..*....|
00000010 8e ed cf 42 7a f5 31 b5 d5 0b 9a 11 37 b7 00 f3 |...Bz.1.....7...|
00000020 ea 1c 43 67 02 20 79 f7 ea e0 84 99 25 ff c4 d4 |..Cg. y.....%...|
00000030 e0 50 bd bf a6 1c 1b c1 d5 41 a3 96 8d 6f 9b c5 |.P.......A...o..|
00000040 6b ac a5 4f 51 56 |k..OQV|
[3619 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes
[361a 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes
[361b 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[361c 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[361d 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 14 fe 41 36 fe fe 93 78 de 2f 5a fe ac 53 69 |E..A6...x./Z..Si|
00000010 e4 f8 ac e9 10 76 dd 5b d8 cd 92 e4 6e 11 5e 21 |.....v.[....n.^!|
[361e 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 60 50 c1 2f 28 e9 b9 b6 5d 4d |0E.!..`P./(...]M|
00000010 93 ce e2 31 ab 67 03 ef 0d 27 32 bf 77 f9 0b 65 |...1.g...'2.w..e|
00000020 d1 d1 16 32 b7 02 20 12 9c 11 ed 88 1c 0c 40 1d |...2.. .......@.|
00000030 71 d1 4b ad c5 aa 34 87 a1 e6 11 9d dc c2 6d df |q.K...4.......m.|
00000040 f0 c1 c3 17 29 fa 0b |....)..|
[361f 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes
[3620 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3621 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[3622 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3623 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3624 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3625 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3626 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3627 02-22 00:14:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3628 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3629 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c 0f 8b 3f 57 a7 e6 c9 22 df 0e 84 48 89 5a fc |...?W..."...H.Z.|
00000010 f4 50 08 de 92 0a 0c 07 47 20 99 54 53 95 00 9b |.P......G .TS...|
[362a 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 b5 37 fe e5 5a 82 66 03 4c f9 f1 |0D. t.7..Z.f.L..|
00000010 7d ad 75 32 92 23 aa 83 b6 b7 7d 48 97 1d 97 c3 |}.u2.#....}H....|
00000020 e9 f6 a8 59 02 20 1a 00 0d ec 29 37 b7 3d 3d 6d |...Y. ....)7.==m|
00000030 63 29 ca 3a f0 c2 0a fc 2a c6 1d 25 07 74 b0 fb |c).:....*..%.t..|
00000040 fd 85 3a 21 72 de |..:!r.|
[362b 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[362c 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375560 gate 1582330494600660100 evaluation starts
[362d 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375560 signed by 0 principal evaluation starts (used [false])
[362e 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375560 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[362f 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3630 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375560 principal evaluation fails
[3631 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375560 gate 1582330494600660100 evaluation fails
[3632 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3633 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3634 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3635 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c 0f 8b 3f 57 a7 e6 c9 22 df 0e 84 48 89 5a fc |...?W..."...H.Z.|
00000010 f4 50 08 de 92 0a 0c 07 47 20 99 54 53 95 00 9b |.P......G .TS...|
[3636 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 b5 37 fe e5 5a 82 66 03 4c f9 f1 |0D. t.7..Z.f.L..|
00000010 7d ad 75 32 92 23 aa 83 b6 b7 7d 48 97 1d 97 c3 |}.u2.#....}H....|
00000020 e9 f6 a8 59 02 20 1a 00 0d ec 29 37 b7 3d 3d 6d |...Y. ....)7.==m|
00000030 63 29 ca 3a f0 c2 0a fc 2a c6 1d 25 07 74 b0 fb |c).:....*..%.t..|
00000040 fd 85 3a 21 72 de |..:!r.|
[3637 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3638 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038c050 gate 1582330494602164300 evaluation starts
[3639 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038c050 signed by 0 principal evaluation starts (used [false])
[363a 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038c050 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[363b 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038c050 principal evaluation succeeds for identity 0
[363c 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038c050 gate 1582330494602164300 evaluation succeeds
[363d 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[363e 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[363f 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3640 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3641 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3642 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3643 02-22 00:14:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3644 02-22 00:14:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15102E
[3645 02-22 00:14:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4E954752CD5E674F37C110F905A5B17A7A070F2E6A6CD21630F3C8E909069A56
[3646 02-22 00:14:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[3647 02-22 00:14:54.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[3648 02-22 00:14:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[3649 02-22 00:14:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[364a 02-22 00:14:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[364b 02-22 00:14:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[364c 02-22 00:14:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[364d 02-22 00:14:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[364e 02-22 00:14:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[364f 02-22 00:14:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3650 02-22 00:14:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3652 02-22 00:14:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes
[3653 02-22 00:14:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3651 02-22 00:14:54.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[3654 02-22 00:14:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3655 02-22 00:14:54.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3656 02-22 00:14:55.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3657 02-22 00:14:55.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3658 02-22 00:14:55.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[3659 02-22 00:14:55.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[365a 02-22 00:14:55.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[365b 02-22 00:14:55.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[365d 02-22 00:14:55.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[365c 02-22 00:14:55.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[365e 02-22 00:14:55.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[365f 02-22 00:14:55.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3660 02-22 00:14:55.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[3662 02-22 00:14:55.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[3663 02-22 00:14:55.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[3661 02-22 00:14:55.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3664 02-22 00:14:55.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[3665 02-22 00:14:55.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3666 02-22 00:14:55.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3667 02-22 00:14:55.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3668 02-22 00:14:55.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3669 02-22 00:14:55.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[366a 02-22 00:14:55.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[366b 02-22 00:14:55.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[366c 02-22 00:14:55.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[366d 02-22 00:14:55.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[366e 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[366f 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3670 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008c3520 gate 1582330495090834400 evaluation starts
[3671 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008c3520 signed by 0 principal evaluation starts (used [false])
[3672 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008c3520 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3673 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008c3520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3674 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008c3520 principal evaluation fails
[3675 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008c3520 gate 1582330495090834400 evaluation fails
[3676 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3677 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3678 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3679 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[367a 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[367b 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[367c 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008c3e20 gate 1582330495094127800 evaluation starts
[367d 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008c3e20 signed by 0 principal evaluation starts (used [false])
[367e 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008c3e20 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[367f 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008c3e20 principal evaluation succeeds for identity 0
[3680 02-22 00:14:55.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008c3e20 gate 1582330495094127800 evaluation succeeds
[3681 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3682 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3683 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3684 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3685 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3686 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3687 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3688 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3689 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[368a 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[368b 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[368c 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[368d 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[368e 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[368f 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3690 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c7510 gate 1582330495105815600 evaluation starts
[3691 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c7510 signed by 0 principal evaluation starts (used [false])
[3692 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c7510 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3693 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c7510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3694 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c7510 principal evaluation fails
[3695 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c7510 gate 1582330495105815600 evaluation fails
[3696 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3697 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3698 02-22 00:14:55.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3699 02-22 00:14:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[369a 02-22 00:14:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[369b 02-22 00:14:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[369c 02-22 00:14:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f03f0 gate 1582330495111723700 evaluation starts
[369d 02-22 00:14:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f03f0 signed by 0 principal evaluation starts (used [false])
[369e 02-22 00:14:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f03f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[369f 02-22 00:14:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f03f0 principal evaluation succeeds for identity 0
[36a0 02-22 00:14:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f03f0 gate 1582330495111723700 evaluation succeeds
[36a1 02-22 00:14:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[36a2 02-22 00:14:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[36a3 02-22 00:14:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[36a4 02-22 00:14:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[36a5 02-22 00:14:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36a6 02-22 00:14:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[36a7 02-22 00:14:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36a8 02-22 00:14:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36a9 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36aa 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[36ab 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[36ac 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[36ad 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[36ae 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[36af 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[36b0 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[36b1 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[36b2 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[36b3 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a8210 gate 1582330495123359200 evaluation starts
[36b4 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a8210 signed by 0 principal evaluation starts (used [false])
[36b5 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a8210 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[36b6 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a8210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[36b7 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a8210 principal evaluation fails
[36b8 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a8210 gate 1582330495123359200 evaluation fails
[36b9 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[36ba 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[36bb 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[36bc 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[36bd 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[36be 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[36bf 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a8bc0 gate 1582330495126363600 evaluation starts
[36c0 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a8bc0 signed by 0 principal evaluation starts (used [false])
[36c1 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a8bc0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[36c2 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a8bc0 principal evaluation succeeds for identity 0
[36c3 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a8bc0 gate 1582330495126363600 evaluation succeeds
[36c4 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[36c5 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[36c6 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[36c7 02-22 00:14:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[36c8 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[36c9 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[36ca 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[36cb 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[36cc 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36cd 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36ce 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[36cf 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[36d0 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[36d1 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[36d2 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[36d3 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[36d4 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[36d5 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[36d6 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[36d7 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b59540 gate 1582330495138767400 evaluation starts
[36d8 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b59540 signed by 0 principal evaluation starts (used [false])
[36d9 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b59540 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[36da 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b59540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[36db 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b59540 principal evaluation fails
[36dc 02-22 00:14:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b59540 gate 1582330495138767400 evaluation fails
[36dd 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[36de 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[36df 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[36e0 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[36e1 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[36e2 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[36e3 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cac040 gate 1582330495142824200 evaluation starts
[36e4 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cac040 signed by 0 principal evaluation starts (used [false])
[36e5 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cac040 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[36e6 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cac040 principal evaluation succeeds for identity 0
[36e7 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cac040 gate 1582330495142824200 evaluation succeeds
[36e8 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[36e9 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[36ea 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[36eb 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[36ec 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[36ed 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[36ee 02-22 00:14:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36ef 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36f0 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[36f1 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[36f2 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[36f3 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[36f4 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[36f5 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[36f6 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[36f7 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[36f8 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[36f9 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[36fa 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002caddd0 gate 1582330495157604800 evaluation starts
[36fb 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002caddd0 signed by 0 principal evaluation starts (used [false])
[36fc 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002caddd0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[36fd 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002caddd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[36fe 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002caddd0 principal evaluation fails
[36ff 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002caddd0 gate 1582330495157604800 evaluation fails
[3700 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3701 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3702 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3703 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[3704 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[3705 02-22 00:14:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3706 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc26d0 gate 1582330495160112800 evaluation starts
[3707 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc26d0 signed by 0 principal evaluation starts (used [false])
[3708 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc26d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3709 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc26d0 principal evaluation succeeds for identity 0
[370a 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc26d0 gate 1582330495160112800 evaluation succeeds
[370b 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[370c 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[370d 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[370e 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[370f 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[3710 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[3711 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3712 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3713 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3714 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3715 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3716 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3717 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3718 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3719 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[371a 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[371b 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[371c 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dac820 gate 1582330495167752600 evaluation starts
[371d 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dac820 signed by 0 principal evaluation starts (used [false])
[371e 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dac820 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[371f 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dac820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3720 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dac820 principal evaluation fails
[3721 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dac820 gate 1582330495167752600 evaluation fails
[3722 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3723 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3724 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3725 02-22 00:14:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3726 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3727 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3728 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dad120 gate 1582330495171022100 evaluation starts
[3729 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dad120 signed by 0 principal evaluation starts (used [false])
[372a 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dad120 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[372b 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dad120 principal evaluation succeeds for identity 0
[372c 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dad120 gate 1582330495171022100 evaluation succeeds
[372d 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[372e 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[372f 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3730 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3731 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[3732 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[3733 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3734 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3735 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3736 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[3737 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3738 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3739 02-22 00:14:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:13215677779739987205 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[373a 02-22 00:14:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:13215677779739987205 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[373b 02-22 00:14:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[373c 02-22 00:14:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 13215677779739987205 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[373d 02-22 00:14:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 13215677779739987205 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[373e 02-22 00:14:55.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[373f 02-22 00:14:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[3740 02-22 00:14:55.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3741 02-22 00:14:55.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3742 02-22 00:14:55.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3743 02-22 00:14:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7435806673187741216 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[3744 02-22 00:14:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7435806673187741216 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[3745 02-22 00:14:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[3746 02-22 00:14:55.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3747 02-22 00:14:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[3748 02-22 00:14:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3749 02-22 00:14:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[374a 02-22 00:14:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[374b 02-22 00:14:56.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[374c 02-22 00:14:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[374d 02-22 00:14:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[374e 02-22 00:14:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[374f 02-22 00:14:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3750 02-22 00:14:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3751 02-22 00:14:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3752 02-22 00:14:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:5464536535206227866 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3753 02-22 00:14:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:5464536535206227866 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3754 02-22 00:14:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3755 02-22 00:14:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3756 02-22 00:14:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3757 02-22 00:14:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3758 02-22 00:14:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3759 02-22 00:14:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[375a 02-22 00:14:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[375b 02-22 00:14:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[375c 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[375d 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[375e 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[375f 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[3760 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c ec 24 01 a9 3c 7e 09 f6 4d 29 82 49 8e cd 76 |<.$..<~..M).I..v|
00000010 19 aa b8 99 2b b2 d6 75 f8 3d c9 9a d8 7a b8 6d |....+..u.=...z.m|
[3761 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 86 4d 63 b0 09 de 0f 11 fa 01 f7 |0D. b.Mc........|
00000010 77 62 64 07 fc 9d 67 2c 4a 93 fe c8 2b e4 41 64 |wbd...g,J...+.Ad|
00000020 a8 90 e6 93 02 20 66 06 83 49 fb 4c 5a 63 60 75 |..... f..I.LZc`u|
00000030 4f fe ed e0 36 91 e6 8c f6 aa b6 a1 3d 0d e3 d8 |O...6.......=...|
00000040 c2 7c 47 e4 0e 5a |.|G..Z|
[3762 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[3763 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 16 18 df a2 42 53 0b 2b 5b b7 |0E.!......BS.+[.|
00000010 f6 42 2a 83 93 b3 e5 66 05 ae d6 7a 1a a0 a9 b6 |.B*....f...z....|
00000020 84 c4 ee 42 f6 02 20 3d ff 8f 07 07 80 7d 94 5c |...B.. =.....}.\|
00000030 c8 f0 a1 e5 0c 3b 66 85 53 a4 e1 e1 ea d7 51 59 |.....;f.S.....QY|
00000040 79 f9 f7 fe 4a e7 63 |y...J.c|
[3764 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3765 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[3766 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:51
[3767 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:51
[3768 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[3769 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[376a 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[376b 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[376c 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[376d 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[376e 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[376f 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[3770 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[3771 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[3772 02-22 00:14:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3773 02-22 00:14:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:16888264103056357784 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3774 02-22 00:14:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:16888264103056357784 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3775 02-22 00:14:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[3776 02-22 00:14:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3777 02-22 00:14:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:7490987342062519993 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3778 02-22 00:14:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:7490987342062519993 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3779 02-22 00:14:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:7490987342062519993 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[377a 02-22 00:14:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[377b 02-22 00:14:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[377c 02-22 00:14:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[377d 02-22 00:14:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[377e 02-22 00:14:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[377f 02-22 00:14:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3780 02-22 00:14:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[3781 02-22 00:14:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3782 02-22 00:14:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[3783 02-22 00:14:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:16837079466514532989 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[3784 02-22 00:14:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[3786 02-22 00:14:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:3063333727094912955 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[3787 02-22 00:14:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[3785 02-22 00:14:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:16837079466514532989 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3788 02-22 00:14:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:16821740618977132540 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[378a 02-22 00:14:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:16821740618977132540 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[378b 02-22 00:14:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:3063333727094912955 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[378d 02-22 00:14:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3789 02-22 00:14:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[378c 02-22 00:14:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[378e 02-22 00:14:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16837079466514532989 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[378f 02-22 00:14:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16837079466514532989 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[3790 02-22 00:14:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16837079466514532989 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[3791 02-22 00:14:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3792 02-22 00:14:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16821740618977132540 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[3793 02-22 00:14:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16821740618977132540 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[3794 02-22 00:14:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3795 02-22 00:14:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3063333727094912955 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[3796 02-22 00:14:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3063333727094912955 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[3797 02-22 00:14:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3798 02-22 00:14:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3799 02-22 00:14:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[379a 02-22 00:14:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[379b 02-22 00:14:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[379c 02-22 00:14:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[379d 02-22 00:14:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[379e 02-22 00:14:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[379f 02-22 00:14:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[37a0 02-22 00:14:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[37a1 02-22 00:14:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[37a2 02-22 00:14:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[37a3 02-22 00:14:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[37a4 02-22 00:14:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f b9 28 8f e7 3f d2 f5 e2 37 64 07 28 9b 77 a3 |_.(..?...7d.(.w.|
00000010 61 69 e1 74 b8 da 01 8f 12 ab 98 69 96 6e 8f 8c |ai.t.......i.n..|
[37a5 02-22 00:14:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 13 d1 88 37 cc 83 2e c5 ff 21 8b |0D. C...7.....!.|
00000010 6f 32 75 f4 0f 81 d1 6e 60 7a 42 38 e0 c3 06 4e |o2u....n`zB8...N|
00000020 39 a0 88 bf 02 20 07 7a b7 92 42 a4 24 0e db 8c |9.... .z..B.$...|
00000030 2d af 73 ea a1 19 87 0b 8c 97 21 f2 ec db 63 57 |-.s.......!...cW|
00000040 51 c9 92 49 f8 4f |Q..I.O|
[37a6 02-22 00:14:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[37a7 02-22 00:14:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb1df0 gate 1582330498466929200 evaluation starts
[37a8 02-22 00:14:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb1df0 signed by 0 principal evaluation starts (used [false])
[37a9 02-22 00:14:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb1df0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[37aa 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb1df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[37ab 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb1df0 principal evaluation fails
[37ac 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002eb1df0 gate 1582330498466929200 evaluation fails
[37ae 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[37af 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[37b0 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[37b1 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f b9 28 8f e7 3f d2 f5 e2 37 64 07 28 9b 77 a3 |_.(..?...7d.(.w.|
00000010 61 69 e1 74 b8 da 01 8f 12 ab 98 69 96 6e 8f 8c |ai.t.......i.n..|
[37b2 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 13 d1 88 37 cc 83 2e c5 ff 21 8b |0D. C...7.....!.|
00000010 6f 32 75 f4 0f 81 d1 6e 60 7a 42 38 e0 c3 06 4e |o2u....n`zB8...N|
00000020 39 a0 88 bf 02 20 07 7a b7 92 42 a4 24 0e db 8c |9.... .z..B.$...|
00000030 2d af 73 ea a1 19 87 0b 8c 97 21 f2 ec db 63 57 |-.s.......!...cW|
00000040 51 c9 92 49 f8 4f |Q..I.O|
[37b3 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[37b4 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a6f0 gate 1582330498474211800 evaluation starts
[37b5 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a6f0 signed by 0 principal evaluation starts (used [false])
[37b6 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a6f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[37b7 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a6f0 principal evaluation succeeds for identity 0
[37b8 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a6f0 gate 1582330498474211800 evaluation succeeds
[37b9 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[37ba 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[37bb 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[37bc 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[37bd 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes
[37be 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes]}
[37bf 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:50
[37c0 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:50
[37c1 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[37c2 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37c3 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37c4 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37c5 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[37c6 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[37c7 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[37c8 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[37c9 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[37ca 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[37cb 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[37cc 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37ad 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[37cd 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37ce 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[37cf 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[37d0 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[37d1 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[37d2 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[37d3 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[37d4 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[37d5 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[37d6 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[37d7 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 7f 41 6b 07 d3 e9 75 d3 d4 78 5d 1a 94 e9 4d |..Ak...u..x]...M|
00000010 25 80 f0 46 a6 4d 64 ac 24 e7 2a 47 d0 82 33 d2 |%..F.Md.$.*G..3.|
[37d8 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd ea 23 d8 f0 c2 0e a7 71 61 b9 |0E.!...#.....qa.|
00000010 61 1c bc e0 e1 6d 72 f3 8f cf 67 b6 a9 f2 47 00 |a....mr...g...G.|
00000020 0b ac 4c d3 49 02 20 58 87 8a b7 0f 7c 1e 55 91 |..L.I. X....|.U.|
00000030 b0 a7 84 13 e3 f0 95 8a c6 2f d4 0f c2 16 a7 53 |........./.....S|
00000040 28 9f 93 49 9a 40 7b |(..I.@{|
[37d9 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[37da 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308d350 gate 1582330498476202300 evaluation starts
[37db 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308d350 signed by 0 principal evaluation starts (used [false])
[37dc 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308d350 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[37dd 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308d350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[37de 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308d350 principal evaluation fails
[37df 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308d350 gate 1582330498476202300 evaluation fails
[37e0 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[37e1 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[37e2 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[37e3 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 7f 41 6b 07 d3 e9 75 d3 d4 78 5d 1a 94 e9 4d |..Ak...u..x]...M|
00000010 25 80 f0 46 a6 4d 64 ac 24 e7 2a 47 d0 82 33 d2 |%..F.Md.$.*G..3.|
[37e4 02-22 00:14:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd ea 23 d8 f0 c2 0e a7 71 61 b9 |0E.!...#.....qa.|
00000010 61 1c bc e0 e1 6d 72 f3 8f cf 67 b6 a9 f2 47 00 |a....mr...g...G.|
00000020 0b ac 4c d3 49 02 20 58 87 8a b7 0f 7c 1e 55 91 |..L.I. X....|.U.|
00000030 b0 a7 84 13 e3 f0 95 8a c6 2f d4 0f c2 16 a7 53 |........./.....S|
00000040 28 9f 93 49 9a 40 7b |(..I.@{|
[37e5 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[37e6 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308dc80 gate 1582330498495655900 evaluation starts
[37e7 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308dc80 signed by 0 principal evaluation starts (used [false])
[37e8 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308dc80 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[37e9 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308dc80 principal evaluation succeeds for identity 0
[37ea 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308dc80 gate 1582330498495655900 evaluation succeeds
[37eb 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[37ec 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[37ed 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[37ee 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[37ef 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes
[37f0 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes]}
[37f1 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:48
[37f2 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:48
[37f3 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[37f4 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37f5 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37f6 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37f7 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[37f8 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[37f9 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[37fa 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[37fb 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[37fc 02-22 00:14:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[37fd 02-22 00:14:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[37fe 02-22 00:14:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[37ff 02-22 00:14:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15102F
[3800 02-22 00:14:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 61939B90F1641A7EB10DA955F3FE3C5B18AB063E2E9BE85DCD60816B2F042F9F
[3801 02-22 00:14:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[3802 02-22 00:14:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[3803 02-22 00:14:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[3804 02-22 00:14:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3805 02-22 00:14:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[3806 02-22 00:14:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3807 02-22 00:14:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3808 02-22 00:14:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3809 02-22 00:14:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[380a 02-22 00:14:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[380b 02-22 00:14:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[380c 02-22 00:14:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[380d 02-22 00:14:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[380e 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[380f 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3811 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[3810 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3812 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[3813 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 93 9b 90 f1 64 1a 7e b1 0d a9 55 f3 fe 3c 5b |a....d.~...U..<[|
00000010 18 ab 06 3e 2e 9b e8 5d cd 60 81 6b 2f 04 2f 9f |...>...].`.k/./.|
[3814 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a7 85 a0 90 71 44 8c 1d 5d 82 |0E.!......qD..].|
00000010 85 6e be 0f 93 99 19 ee 38 ae 42 f6 43 59 99 b9 |.n......8.B.CY..|
00000020 3b b2 6a 8a 7c 02 20 45 ee 1b 7a 16 89 79 e4 d8 |;.j.|. E..z..y..|
00000030 30 ec 4f 06 e5 54 83 19 c9 18 64 21 ab b2 18 a0 |0.O..T....d!....|
00000040 67 ce 8f 3c 32 8c ae |g..<2..|
[3815 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes
[3816 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes
[3817 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3818 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[3819 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c ec 24 01 a9 3c 7e 09 f6 4d 29 82 49 8e cd 76 |<.$..<~..M).I..v|
00000010 19 aa b8 99 2b b2 d6 75 f8 3d c9 9a d8 7a b8 6d |....+..u.=...z.m|
[381a 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 86 4d 63 b0 09 de 0f 11 fa 01 f7 |0D. b.Mc........|
00000010 77 62 64 07 fc 9d 67 2c 4a 93 fe c8 2b e4 41 64 |wbd...g,J...+.Ad|
00000020 a8 90 e6 93 02 20 66 06 83 49 fb 4c 5a 63 60 75 |..... f..I.LZc`u|
00000030 4f fe ed e0 36 91 e6 8c f6 aa b6 a1 3d 0d e3 d8 |O...6.......=...|
00000040 c2 7c 47 e4 0e 5a |.|G..Z|
[381b 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[381c 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[381d 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[381e 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[381f 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3820 02-22 00:14:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3821 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3822 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3823 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3824 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3825 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3826 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f b9 28 8f e7 3f d2 f5 e2 37 64 07 28 9b 77 a3 |_.(..?...7d.(.w.|
00000010 61 69 e1 74 b8 da 01 8f 12 ab 98 69 96 6e 8f 8c |ai.t.......i.n..|
[3827 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 13 d1 88 37 cc 83 2e c5 ff 21 8b |0D. C...7.....!.|
00000010 6f 32 75 f4 0f 81 d1 6e 60 7a 42 38 e0 c3 06 4e |o2u....n`zB8...N|
00000020 39 a0 88 bf 02 20 07 7a b7 92 42 a4 24 0e db 8c |9.... .z..B.$...|
00000030 2d af 73 ea a1 19 87 0b 8c 97 21 f2 ec db 63 57 |-.s.......!...cW|
00000040 51 c9 92 49 f8 4f |Q..I.O|
[3828 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3829 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cebf0 gate 1582330498553881600 evaluation starts
[382a 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cebf0 signed by 0 principal evaluation starts (used [false])
[382b 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cebf0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[382c 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cebf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[382d 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cebf0 principal evaluation fails
[382e 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cebf0 gate 1582330498553881600 evaluation fails
[382f 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3830 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3831 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3832 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f b9 28 8f e7 3f d2 f5 e2 37 64 07 28 9b 77 a3 |_.(..?...7d.(.w.|
00000010 61 69 e1 74 b8 da 01 8f 12 ab 98 69 96 6e 8f 8c |ai.t.......i.n..|
[3833 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 13 d1 88 37 cc 83 2e c5 ff 21 8b |0D. C...7.....!.|
00000010 6f 32 75 f4 0f 81 d1 6e 60 7a 42 38 e0 c3 06 4e |o2u....n`zB8...N|
00000020 39 a0 88 bf 02 20 07 7a b7 92 42 a4 24 0e db 8c |9.... .z..B.$...|
00000030 2d af 73 ea a1 19 87 0b 8c 97 21 f2 ec db 63 57 |-.s.......!...cW|
00000040 51 c9 92 49 f8 4f |Q..I.O|
[3834 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3835 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cf500 gate 1582330498556708100 evaluation starts
[3836 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cf500 signed by 0 principal evaluation starts (used [false])
[3837 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cf500 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3838 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cf500 principal evaluation succeeds for identity 0
[3839 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cf500 gate 1582330498556708100 evaluation succeeds
[383a 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[383b 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[383c 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[383d 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[383e 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes
[383f 02-22 00:14:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3840 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3841 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[3842 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3844 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3843 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[3845 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 93 9b 90 f1 64 1a 7e b1 0d a9 55 f3 fe 3c 5b |a....d.~...U..<[|
00000010 18 ab 06 3e 2e 9b e8 5d cd 60 81 6b 2f 04 2f 9f |...>...].`.k/./.|
[3846 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a7 85 a0 90 71 44 8c 1d 5d 82 |0E.!......qD..].|
00000010 85 6e be 0f 93 99 19 ee 38 ae 42 f6 43 59 99 b9 |.n......8.B.CY..|
00000020 3b b2 6a 8a 7c 02 20 45 ee 1b 7a 16 89 79 e4 d8 |;.j.|. E..z..y..|
00000030 30 ec 4f 06 e5 54 83 19 c9 18 64 21 ab b2 18 a0 |0.O..T....d!....|
00000040 67 ce 8f 3c 32 8c ae |g..<2..|
[3847 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[3848 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 48 e6 74 91 51 4c f9 56 41 c3 |0E.!..H.t.QL.VA.|
00000010 c0 f0 b0 60 0e 13 a9 0d 2c 4c 88 85 ca 45 ed bb |...`....,L...E..|
00000020 29 ca ba d8 05 02 20 30 8a b7 ea a2 d4 2e f5 06 |)..... 0........|
00000030 5a bb 88 0e f7 66 8b b8 68 cf 4b e6 a0 73 f2 1d |Z....f..h.K..s..|
00000040 ce d5 48 56 8e e9 5c |..HV..\|
[3849 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[384a 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[384b 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[384c 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[384d 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[384e 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[384f 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 93 9b 90 f1 64 1a 7e b1 0d a9 55 f3 fe 3c 5b |a....d.~...U..<[|
00000010 18 ab 06 3e 2e 9b e8 5d cd 60 81 6b 2f 04 2f 9f |...>...].`.k/./.|
[3850 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a7 85 a0 90 71 44 8c 1d 5d 82 |0E.!......qD..].|
00000010 85 6e be 0f 93 99 19 ee 38 ae 42 f6 43 59 99 b9 |.n......8.B.CY..|
00000020 3b b2 6a 8a 7c 02 20 45 ee 1b 7a 16 89 79 e4 d8 |;.j.|. E..z..y..|
00000030 30 ec 4f 06 e5 54 83 19 c9 18 64 21 ab b2 18 a0 |0.O..T....d!....|
00000040 67 ce 8f 3c 32 8c ae |g..<2..|
[3851 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes
[3852 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes
[3853 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3854 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[3855 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c ec 24 01 a9 3c 7e 09 f6 4d 29 82 49 8e cd 76 |<.$..<~..M).I..v|
00000010 19 aa b8 99 2b b2 d6 75 f8 3d c9 9a d8 7a b8 6d |....+..u.=...z.m|
[3856 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 86 4d 63 b0 09 de 0f 11 fa 01 f7 |0D. b.Mc........|
00000010 77 62 64 07 fc 9d 67 2c 4a 93 fe c8 2b e4 41 64 |wbd...g,J...+.Ad|
00000020 a8 90 e6 93 02 20 66 06 83 49 fb 4c 5a 63 60 75 |..... f..I.LZc`u|
00000030 4f fe ed e0 36 91 e6 8c f6 aa b6 a1 3d 0d e3 d8 |O...6.......=...|
00000040 c2 7c 47 e4 0e 5a |.|G..Z|
[3857 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3858 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3859 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[385a 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[385b 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[385c 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[385d 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[385e 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[385f 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3860 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3861 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3862 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 7f 41 6b 07 d3 e9 75 d3 d4 78 5d 1a 94 e9 4d |..Ak...u..x]...M|
00000010 25 80 f0 46 a6 4d 64 ac 24 e7 2a 47 d0 82 33 d2 |%..F.Md.$.*G..3.|
[3863 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd ea 23 d8 f0 c2 0e a7 71 61 b9 |0E.!...#.....qa.|
00000010 61 1c bc e0 e1 6d 72 f3 8f cf 67 b6 a9 f2 47 00 |a....mr...g...G.|
00000020 0b ac 4c d3 49 02 20 58 87 8a b7 0f 7c 1e 55 91 |..L.I. X....|.U.|
00000030 b0 a7 84 13 e3 f0 95 8a c6 2f d4 0f c2 16 a7 53 |........./.....S|
00000040 28 9f 93 49 9a 40 7b |(..I.@{|
[3864 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3865 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003235f70 gate 1582330498566318300 evaluation starts
[3866 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003235f70 signed by 0 principal evaluation starts (used [false])
[3867 02-22 00:14:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003235f70 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3868 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003235f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3869 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003235f70 principal evaluation fails
[386a 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003235f70 gate 1582330498566318300 evaluation fails
[386b 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[386c 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[386d 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[386e 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 7f 41 6b 07 d3 e9 75 d3 d4 78 5d 1a 94 e9 4d |..Ak...u..x]...M|
00000010 25 80 f0 46 a6 4d 64 ac 24 e7 2a 47 d0 82 33 d2 |%..F.Md.$.*G..3.|
[386f 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd ea 23 d8 f0 c2 0e a7 71 61 b9 |0E.!...#.....qa.|
00000010 61 1c bc e0 e1 6d 72 f3 8f cf 67 b6 a9 f2 47 00 |a....mr...g...G.|
00000020 0b ac 4c d3 49 02 20 58 87 8a b7 0f 7c 1e 55 91 |..L.I. X....|.U.|
00000030 b0 a7 84 13 e3 f0 95 8a c6 2f d4 0f c2 16 a7 53 |........./.....S|
00000040 28 9f 93 49 9a 40 7b |(..I.@{|
[3870 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3871 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b0870 gate 1582330498572032400 evaluation starts
[3872 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b0870 signed by 0 principal evaluation starts (used [false])
[3873 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b0870 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3874 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b0870 principal evaluation succeeds for identity 0
[3875 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b0870 gate 1582330498572032400 evaluation succeeds
[3876 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3877 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3878 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3879 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[387a 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes
[387b 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[387c 02-22 00:14:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[387d 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[387e 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[387f 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[3880 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[3881 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3882 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[3883 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3884 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[3885 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3886 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3887 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3888 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[3889 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[388a 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[388b 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[388c 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[388d 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[388e 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[388f 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3890 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3891 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3892 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3893 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3894 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3895 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3896 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3897 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003307460 gate 1582330499046915800 evaluation starts
[3898 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003307460 signed by 0 principal evaluation starts (used [false])
[3899 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003307460 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[389a 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003307460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[389b 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003307460 principal evaluation fails
[389c 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003307460 gate 1582330499046915800 evaluation fails
[389d 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[389e 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[389f 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[38a0 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[38a1 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[38a2 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[38a3 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003307d70 gate 1582330499048988900 evaluation starts
[38a4 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003307d70 signed by 0 principal evaluation starts (used [false])
[38a5 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003307d70 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[38a6 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003307d70 principal evaluation succeeds for identity 0
[38a7 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003307d70 gate 1582330499048988900 evaluation succeeds
[38a8 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[38a9 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[38aa 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[38ab 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[38ac 02-22 00:14:59.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[38ad 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[38ae 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[38af 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[38b0 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[38b1 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[38b2 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[38b3 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[38b4 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[38b5 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[38b6 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[38b7 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323a50 gate 1582330499053706600 evaluation starts
[38b8 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323a50 signed by 0 principal evaluation starts (used [false])
[38b9 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323a50 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[38ba 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[38bb 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323a50 principal evaluation fails
[38bc 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323a50 gate 1582330499053706600 evaluation fails
[38bd 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[38be 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[38bf 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[38c0 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[38c1 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[38c2 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[38c3 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e8450 gate 1582330499055196600 evaluation starts
[38c4 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e8450 signed by 0 principal evaluation starts (used [false])
[38c5 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e8450 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[38c6 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e8450 principal evaluation succeeds for identity 0
[38c7 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e8450 gate 1582330499055196600 evaluation succeeds
[38c8 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[38c9 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[38ca 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[38cb 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[38cc 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[38cd 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[38ce 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[38cf 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[38d0 02-22 00:14:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[38d1 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[38d2 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[38d3 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[38d4 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[38d5 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[38d6 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[38d7 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[38d8 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[38d9 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[38da 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404200 gate 1582330499061619300 evaluation starts
[38db 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404200 signed by 0 principal evaluation starts (used [false])
[38dc 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404200 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[38dd 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[38de 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404200 principal evaluation fails
[38df 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404200 gate 1582330499061619300 evaluation fails
[38e0 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[38e1 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[38e2 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[38e3 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[38e4 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[38e5 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[38e6 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404b00 gate 1582330499062056600 evaluation starts
[38e7 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404b00 signed by 0 principal evaluation starts (used [false])
[38e8 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404b00 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[38e9 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404b00 principal evaluation succeeds for identity 0
[38ea 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404b00 gate 1582330499062056600 evaluation succeeds
[38eb 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[38ec 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[38ed 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[38ee 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[38ef 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[38f0 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[38f1 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[38f2 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[38f3 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[38f4 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[38f5 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[38f6 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[38f7 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[38f8 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[38f9 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[38fa 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[38fb 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[38fc 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003528c30 gate 1582330499065492300 evaluation starts
[38fd 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003528c30 signed by 0 principal evaluation starts (used [false])
[38fe 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003528c30 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[38ff 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003528c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3900 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003528c30 principal evaluation fails
[3901 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003528c30 gate 1582330499065492300 evaluation fails
[3902 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3903 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3904 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3905 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3906 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3907 02-22 00:14:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3908 02-22 00:14:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003529530 gate 1582330499077110400 evaluation starts
[3909 02-22 00:14:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003529530 signed by 0 principal evaluation starts (used [false])
[390a 02-22 00:14:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003529530 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[390b 02-22 00:14:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003529530 principal evaluation succeeds for identity 0
[390c 02-22 00:14:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003529530 gate 1582330499077110400 evaluation succeeds
[390d 02-22 00:14:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[390e 02-22 00:14:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[390f 02-22 00:14:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3910 02-22 00:14:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3911 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[3912 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[3913 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3914 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3915 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3916 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3917 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3918 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3919 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[391a 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[391b 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[391c 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[391d 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[391e 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[391f 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3920 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3921 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003541910 gate 1582330499085358000 evaluation starts
[3922 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003541910 signed by 0 principal evaluation starts (used [false])
[3923 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003541910 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3924 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003541910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3925 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003541910 principal evaluation fails
[3926 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003541910 gate 1582330499085358000 evaluation fails
[3927 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3928 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3929 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[392a 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[392b 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[392c 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[392d 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546230 gate 1582330499088172800 evaluation starts
[392e 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546230 signed by 0 principal evaluation starts (used [false])
[392f 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546230 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3930 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546230 principal evaluation succeeds for identity 0
[3931 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003546230 gate 1582330499088172800 evaluation succeeds
[3932 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3933 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3934 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3935 02-22 00:14:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3936 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[3937 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[3938 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[3939 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[393a 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[393b 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[393c 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[393d 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[393e 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[393f 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3940 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3941 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3942 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[3943 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[3944 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3945 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c9f0 gate 1582330499093462900 evaluation starts
[3946 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c9f0 signed by 0 principal evaluation starts (used [false])
[3947 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c9f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3948 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c9f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3949 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c9f0 principal evaluation fails
[394a 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362c9f0 gate 1582330499093462900 evaluation fails
[394b 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[394c 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[394d 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[394e 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[394f 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[3950 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3951 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d300 gate 1582330499096515000 evaluation starts
[3952 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d300 signed by 0 principal evaluation starts (used [false])
[3953 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d300 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3954 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d300 principal evaluation succeeds for identity 0
[3955 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d300 gate 1582330499096515000 evaluation succeeds
[3956 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3957 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3958 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3959 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[395a 02-22 00:14:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[395b 02-22 00:14:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[395c 02-22 00:14:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[395d 02-22 00:14:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[395e 02-22 00:14:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[395f 02-22 00:14:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3960 02-22 00:14:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15369669718583055786 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[3961 02-22 00:14:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15369669718583055786 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[3962 02-22 00:14:59.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3963 02-22 00:14:59.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15369669718583055786 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[3964 02-22 00:14:59.15 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15369669718583055786 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[3965 02-22 00:14:59.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3966 02-22 00:14:59.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3967 02-22 00:14:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3968 02-22 00:14:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3969 02-22 00:14:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[396a 02-22 00:14:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 74 b5 3c ad 06 f0 8d e0 54 bf 8f 12 19 7c c0 |.t.<.....T....|.|
00000010 1e c3 f9 4f e0 52 4a 0c 2d 93 c6 ab da e2 e5 1a |...O.RJ.-.......|
[396b 02-22 00:14:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 f3 46 15 d0 21 0a 93 16 95 bb |0E.!...F..!.....|
00000010 f2 2d 24 9a bc fb 59 ae 04 e6 f2 8f d5 a6 aa af |.-$...Y.........|
00000020 ae 85 1d 6e 3d 02 20 16 c1 73 35 86 03 71 73 d0 |...n=. ..s5..qs.|
00000030 d8 49 07 cf fb 11 07 48 1c ec 59 31 bc 97 60 31 |.I.....H..Y1..`1|
00000040 32 51 f6 ed 82 c1 d7 |2Q.....|
[396c 02-22 00:14:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[396d 02-22 00:14:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 1d 61 87 8f b3 b6 9a e5 33 39 |0E.!...a......39|
00000010 b3 f0 3e 59 cc 6e bb da 53 bb 31 07 d5 a9 16 c6 |..>Y.n..S.1.....|
00000020 68 32 a1 35 5b 02 20 48 16 c1 ac 9b 6e fd 08 04 |h2.5[. H....n...|
00000030 7b cd ad f2 42 32 51 92 4c f5 84 87 be 13 e6 c9 |{...B2Q.L.......|
00000040 50 79 92 88 2f 98 6f |Py../.o|
[396e 02-22 00:14:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[396f 02-22 00:14:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[3970 02-22 00:14:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:52
[3971 02-22 00:14:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:52
[3972 02-22 00:14:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[3973 02-22 00:14:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3974 02-22 00:14:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3975 02-22 00:14:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3976 02-22 00:14:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3977 02-22 00:14:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3978 02-22 00:14:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3979 02-22 00:14:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[397a 02-22 00:14:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes
[397b 02-22 00:14:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[397d 02-22 00:14:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[397e 02-22 00:14:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes
[397f 02-22 00:14:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[397c 02-22 00:14:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes
[3980 02-22 00:14:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3981 02-22 00:14:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes
[3982 02-22 00:14:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3984 02-22 00:14:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes
[3983 02-22 00:14:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes
[3985 02-22 00:14:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3986 02-22 00:14:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes
[3987 02-22 00:14:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3988 02-22 00:14:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3989 02-22 00:14:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[398a 02-22 00:14:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[398b 02-22 00:14:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[398c 02-22 00:14:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[398d 02-22 00:14:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[398e 02-22 00:14:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[398f 02-22 00:14:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3990 02-22 00:14:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3991 02-22 00:14:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3992 02-22 00:14:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3993 02-22 00:14:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3994 02-22 00:14:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3995 02-22 00:14:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 90 39 4e ae 6e 99 d8 bd eb 6f f6 73 82 e5 ee |..9N.n....o.s...|
00000010 1a 37 07 ef 32 7d 0a 7b d2 4d 9b d3 9d d1 96 1c |.7..2}.{.M......|
[3996 02-22 00:14:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 62 d2 e8 a0 3c a0 66 ee 31 2b 44 |0D. .b...<.f.1+D|
00000010 f0 4f 43 ce 4a 92 db 4a cf 41 70 87 1b 01 4d 6d |.OC.J..J.Ap...Mm|
00000020 3a 2f b3 f3 02 20 30 65 90 a1 f1 9a c3 67 1d 85 |:/... 0e.....g..|
00000030 42 7a a7 81 3f 3a 50 ad 36 38 b1 f0 c8 7f 08 70 |Bz..?:P.68.....p|
00000040 3a d7 ea 61 ff 48 |:..a.H|
[3997 02-22 00:14:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3998 02-22 00:14:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728b00 gate 1582330499289927200 evaluation starts
[3999 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728b00 signed by 0 principal evaluation starts (used [false])
[399a 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728b00 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[399b 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[399c 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728b00 principal evaluation fails
[399d 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728b00 gate 1582330499289927200 evaluation fails
[399e 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[399f 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[39a0 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[39a1 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 90 39 4e ae 6e 99 d8 bd eb 6f f6 73 82 e5 ee |..9N.n....o.s...|
00000010 1a 37 07 ef 32 7d 0a 7b d2 4d 9b d3 9d d1 96 1c |.7..2}.{.M......|
[39a2 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 62 d2 e8 a0 3c a0 66 ee 31 2b 44 |0D. .b...<.f.1+D|
00000010 f0 4f 43 ce 4a 92 db 4a cf 41 70 87 1b 01 4d 6d |.OC.J..J.Ap...Mm|
00000020 3a 2f b3 f3 02 20 30 65 90 a1 f1 9a c3 67 1d 85 |:/... 0e.....g..|
00000030 42 7a a7 81 3f 3a 50 ad 36 38 b1 f0 c8 7f 08 70 |Bz..?:P.68.....p|
00000040 3a d7 ea 61 ff 48 |:..a.H|
[39a3 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[39a4 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729400 gate 1582330499295408500 evaluation starts
[39a5 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729400 signed by 0 principal evaluation starts (used [false])
[39a6 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729400 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[39a7 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729400 principal evaluation succeeds for identity 0
[39a8 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729400 gate 1582330499295408500 evaluation succeeds
[39a9 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[39aa 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[39ab 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[39ac 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[39ad 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[39ae 02-22 00:14:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes]}
[39af 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:51
[39b0 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:51
[39b1 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[39b2 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39b3 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39b4 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39b5 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39b6 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39b7 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39b8 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39b9 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39ba 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39bb 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39bc 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[39bd 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39be 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[39bf 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[39c0 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39c1 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[39c2 02-22 00:14:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39c3 02-22 00:14:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[39c4 02-22 00:14:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39c5 02-22 00:14:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[39c6 02-22 00:14:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39c7 02-22 00:14:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[39c8 02-22 00:14:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39c9 02-22 00:14:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[39ca 02-22 00:14:59.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39cb 02-22 00:14:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[39cc 02-22 00:14:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[39cd 02-22 00:14:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510101801
[39ce 02-22 00:14:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 50BB0463B40A0471AA0D85FD37E42E8F43C0AB64CDEBB581326CB7BC35E60633
[39cf 02-22 00:14:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[39d0 02-22 00:14:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39d1 02-22 00:14:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39d2 02-22 00:14:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39d3 02-22 00:14:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39d4 02-22 00:14:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:16 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[39d5 02-22 00:14:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39d7 02-22 00:14:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39d6 02-22 00:14:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:16 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[39d8 02-22 00:14:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39d9 02-22 00:14:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[39da 02-22 00:14:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[39db 02-22 00:14:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[39dc 02-22 00:14:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[39dd 02-22 00:14:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[39de 02-22 00:14:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[39df 02-22 00:14:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[39e0 02-22 00:14:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[39e1 02-22 00:14:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[39e2 02-22 00:14:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[39e3 02-22 00:14:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[39e4 02-22 00:14:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 28 aa 9c 38 4a 3f 4d 5a cf fe 53 54 d2 a6 d7 |.(..8J?MZ..ST...|
00000010 3a d4 89 f9 c7 70 ae b6 35 b3 ed ee 57 e4 66 e1 |:....p..5...W.f.|
[39e5 02-22 00:14:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b 29 79 44 c9 ad d4 48 bb 56 f7 c1 |0D. K)yD...H.V..|
00000010 98 d0 8c 76 58 e9 67 78 7f 09 ae e0 66 da eb 5b |...vX.gx....f..[|
00000020 cb 1e ad 44 02 20 34 dd 20 15 4e e1 e7 ed 9f bd |...D. 4. .N.....|
00000030 99 38 63 2b fc 0d 86 95 db 31 6e 0f a7 e4 28 52 |.8c+.....1n...(R|
00000040 87 af 24 6a 0e 5b |..$j.[|
[39e6 02-22 00:14:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[39e7 02-22 00:14:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037928b0 gate 1582330499377084300 evaluation starts
[39e8 02-22 00:14:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037928b0 signed by 0 principal evaluation starts (used [false])
[39e9 02-22 00:14:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037928b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[39ea 02-22 00:14:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037928b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[39eb 02-22 00:14:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037928b0 principal evaluation fails
[39ec 02-22 00:14:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037928b0 gate 1582330499377084300 evaluation fails
[39ed 02-22 00:14:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[39ee 02-22 00:14:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[39ef 02-22 00:14:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[39f0 02-22 00:14:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 28 aa 9c 38 4a 3f 4d 5a cf fe 53 54 d2 a6 d7 |.(..8J?MZ..ST...|
00000010 3a d4 89 f9 c7 70 ae b6 35 b3 ed ee 57 e4 66 e1 |:....p..5...W.f.|
[39f1 02-22 00:14:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b 29 79 44 c9 ad d4 48 bb 56 f7 c1 |0D. K)yD...H.V..|
00000010 98 d0 8c 76 58 e9 67 78 7f 09 ae e0 66 da eb 5b |...vX.gx....f..[|
00000020 cb 1e ad 44 02 20 34 dd 20 15 4e e1 e7 ed 9f bd |...D. 4. .N.....|
00000030 99 38 63 2b fc 0d 86 95 db 31 6e 0f a7 e4 28 52 |.8c+.....1n...(R|
00000040 87 af 24 6a 0e 5b |..$j.[|
[39f2 02-22 00:14:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[39f3 02-22 00:14:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037931b0 gate 1582330499381387100 evaluation starts
[39f4 02-22 00:14:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037931b0 signed by 0 principal evaluation starts (used [false])
[39f5 02-22 00:14:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037931b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[39f6 02-22 00:14:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037931b0 principal evaluation succeeds for identity 0
[39f7 02-22 00:14:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037931b0 gate 1582330499381387100 evaluation succeeds
[39f8 02-22 00:14:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[39f9 02-22 00:14:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[39fa 02-22 00:14:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[39fb 02-22 00:14:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[39fc 02-22 00:14:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[39fd 02-22 00:14:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[39fe 02-22 00:14:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[39ff 02-22 00:14:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes]}
[3a00 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:49
[3a01 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:49
[3a02 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[3a03 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a04 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a05 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a06 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3a07 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a08 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a09 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a0a 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3a0b 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a0c 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3a0d 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a0e 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a0f 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a10 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a11 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a12 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a13 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a14 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3a15 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a17 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3a18 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3a19 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a16 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3a1a 02-22 00:14:59.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a1b 02-22 00:14:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[3a1c 02-22 00:14:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a1d 02-22 00:14:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a1e 02-22 00:14:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a1f 02-22 00:14:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151030
[3a20 02-22 00:14:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 149D3ABE11BF45806A15F9143053CB62C6212EB59ABA93ACD572D9A86740858A
[3a21 02-22 00:14:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[3a22 02-22 00:14:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[3a23 02-22 00:14:59.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[3a24 02-22 00:14:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a25 02-22 00:14:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a26 02-22 00:14:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a27 02-22 00:14:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3a28 02-22 00:14:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a29 02-22 00:14:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3a2a 02-22 00:14:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes
[3a2c 02-22 00:14:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes
[3a2d 02-22 00:14:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a2e 02-22 00:14:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a2b 02-22 00:14:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[3a2f 02-22 00:14:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3a30 02-22 00:14:59.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a31 02-22 00:14:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8756274524590862725 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[3a32 02-22 00:14:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8756274524590862725 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[3a33 02-22 00:14:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[3a34 02-22 00:14:59.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a35 02-22 00:14:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[3a36 02-22 00:14:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a37 02-22 00:14:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a38 02-22 00:14:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a39 02-22 00:14:59.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a3a 02-22 00:15:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[3a3b 02-22 00:15:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[3a3c 02-22 00:15:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a3d 02-22 00:15:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a3e 02-22 00:15:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a3f 02-22 00:15:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a40 02-22 00:15:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:14590105108870576416 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3a41 02-22 00:15:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:14590105108870576416 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3a42 02-22 00:15:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a43 02-22 00:15:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a44 02-22 00:15:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a45 02-22 00:15:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a46 02-22 00:15:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a47 02-22 00:15:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a48 02-22 00:15:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[3a49 02-22 00:15:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a4a 02-22 00:15:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[3a4b 02-22 00:15:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a4c 02-22 00:15:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[3a4d 02-22 00:15:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[3a4e 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 29 b2 ae 51 77 6d 2a bf 36 dd 0e 81 9a 06 f9 |.)..Qwm*.6......|
00000010 f2 36 31 bb 5f 1b 1e 21 d7 37 72 a2 5e 11 18 bc |.61._..!.7r.^...|
[3a4f 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 6b e8 58 ef 85 5f df 71 9c 43 |0E.!..k.X.._.q.C|
00000010 37 26 b3 d4 45 9d d3 be 34 5e c6 94 29 a7 09 26 |7&..E...4^..)..&|
00000020 76 fb d4 8e 40 02 20 1a 7d aa 73 d7 aa 9f 28 56 |v...@. .}.s...(V|
00000030 4d 3c e8 05 2d ae 72 a5 a9 25 d0 8f 7c ba 08 26 |M<..-.r..%..|..&|
00000040 93 19 a4 98 99 82 fb |.......|
[3a50 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[3a51 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 38 e6 e2 a8 48 1d 6c 17 12 26 ab |0D. h8...H.l..&.|
00000010 3a a9 85 b6 1c 57 2b 03 ef 8f 80 03 d6 41 7e 09 |:....W+......A~.|
00000020 c4 6a aa af 02 20 79 09 0a a4 4f 0a bd 13 99 78 |.j... y...O....x|
00000030 af d3 71 13 82 ec 8b 26 77 89 df 51 f8 6c 90 2a |..q....&w..Q.l.*|
00000040 fb 71 2e df 4f ed |.q..O.|
[3a52 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3a53 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[3a54 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:53
[3a55 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:53
[3a56 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[3a57 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a58 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a59 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a5a 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[3a5b 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a5c 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a5d 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[3a5e 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[3a5f 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[3a60 02-22 00:15:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a61 02-22 00:15:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:5431710274009129243 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3a62 02-22 00:15:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:5431710274009129243 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3a63 02-22 00:15:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[3a64 02-22 00:15:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a65 02-22 00:15:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:12060343279242948610 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3a66 02-22 00:15:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:12060343279242948610 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3a67 02-22 00:15:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:12060343279242948610 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3a68 02-22 00:15:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a69 02-22 00:15:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a6a 02-22 00:15:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a6b 02-22 00:15:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a6c 02-22 00:15:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a6d 02-22 00:15:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a6e 02-22 00:15:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[3a6f 02-22 00:15:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a70 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[3a71 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:9698973314091913217 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[3a72 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[3a73 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7497477968952647403 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[3a74 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[3a75 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:14174252367915898652 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[3a76 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:14174252367915898652 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3a77 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a78 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:9698973314091913217 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3a79 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a7a 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7497477968952647403 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3a7b 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a7c 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9698973314091913217 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[3a7d 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9698973314091913217 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[3a7e 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a7f 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14174252367915898652 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[3a80 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14174252367915898652 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[3a81 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14174252367915898652 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[3a82 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a83 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7497477968952647403 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[3a84 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7497477968952647403 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[3a85 02-22 00:15:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a86 02-22 00:15:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3a87 02-22 00:15:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3a88 02-22 00:15:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3a89 02-22 00:15:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3a8a 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[3a8b 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3a8c 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3a8d 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3a8e 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3a8f 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3a90 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3a91 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3a92 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df ca d8 ea 4c cf 39 1c a4 af f7 2b 23 ca b8 8e |....L.9....+#...|
00000010 f7 b0 66 00 a4 32 47 ed 77 7c 1a a7 2a be 7e 4b |..f..2G.w|..*.~K|
[3a93 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 1f 30 9b 32 92 b5 b4 3f 92 fd 3d |0D. >.0.2...?..=|
00000010 4c 18 7d 6e 60 8b 50 06 d0 cc e5 d4 d4 ec dd 88 |L.}n`.P.........|
00000020 eb c7 d7 57 02 20 0e 0c 5d 2d d9 87 95 21 82 b1 |...W. ..]-...!..|
00000030 5c 30 48 02 b4 0d e9 ff e4 18 5b c0 18 bc 99 9c |\0H.......[.....|
00000040 17 df d6 8d 2a 05 |....*.|
[3a94 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3a95 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039beb30 gate 1582330502461956500 evaluation starts
[3a96 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039beb30 signed by 0 principal evaluation starts (used [false])
[3a97 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039beb30 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3a98 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039beb30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3a99 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039beb30 principal evaluation fails
[3a9a 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039beb30 gate 1582330502461956500 evaluation fails
[3a9b 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3a9c 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3a9d 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3a9e 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df ca d8 ea 4c cf 39 1c a4 af f7 2b 23 ca b8 8e |....L.9....+#...|
00000010 f7 b0 66 00 a4 32 47 ed 77 7c 1a a7 2a be 7e 4b |..f..2G.w|..*.~K|
[3a9f 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 1f 30 9b 32 92 b5 b4 3f 92 fd 3d |0D. >.0.2...?..=|
00000010 4c 18 7d 6e 60 8b 50 06 d0 cc e5 d4 d4 ec dd 88 |L.}n`.P.........|
00000020 eb c7 d7 57 02 20 0e 0c 5d 2d d9 87 95 21 82 b1 |...W. ..]-...!..|
00000030 5c 30 48 02 b4 0d e9 ff e4 18 5b c0 18 bc 99 9c |\0H.......[.....|
00000040 17 df d6 8d 2a 05 |....*.|
[3aa0 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3aa1 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bf430 gate 1582330502462367700 evaluation starts
[3aa2 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bf430 signed by 0 principal evaluation starts (used [false])
[3aa3 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bf430 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3aa4 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bf430 principal evaluation succeeds for identity 0
[3aa5 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bf430 gate 1582330502462367700 evaluation succeeds
[3aa6 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3aa7 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3aa8 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3aa9 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3aaa 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes
[3aab 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes]}
[3aac 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:52
[3aad 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:52
[3aae 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[3aaf 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ab0 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ab1 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ab2 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[3ab3 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ab4 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ab5 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ab6 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[3ab7 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[3ab8 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3ab9 02-22 00:15:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3aba 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3abb 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3abc 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3abd 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[3abe 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3abf 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3ac0 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3ac1 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3ac2 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3ac3 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3ac4 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3ac5 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 2e 29 db 13 16 fa 06 52 df 84 58 22 76 cb 3c |R.).....R..X"v.<|
00000010 68 a2 05 6e 77 c9 66 c4 2e f3 2f 1e 3c bf 6c 1b |h..nw.f.../.<.l.|
[3ac6 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 90 ae d6 b1 ae 37 4e d5 c3 4a 3d |0D. Q.....7N..J=|
00000010 58 a9 0b 94 ef 71 0b 43 24 0c b2 43 15 fe e4 e9 |X....q.C$..C....|
00000020 c7 80 e4 1c 02 20 25 d4 6b 65 4b ff ac 83 77 6d |..... %.keK...wm|
00000030 e5 22 c3 ae 69 6e 7e c0 c4 c9 b9 68 7b 1e 84 4f |."..in~....h{..O|
00000040 25 c6 4e 87 08 7b |%.N..{|
[3ac7 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3ac8 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4cc60 gate 1582330502488450500 evaluation starts
[3ac9 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4cc60 signed by 0 principal evaluation starts (used [false])
[3aca 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4cc60 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3acb 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4cc60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3acc 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4cc60 principal evaluation fails
[3acd 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4cc60 gate 1582330502488450500 evaluation fails
[3ace 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3acf 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3ad0 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3ad1 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 2e 29 db 13 16 fa 06 52 df 84 58 22 76 cb 3c |R.).....R..X"v.<|
00000010 68 a2 05 6e 77 c9 66 c4 2e f3 2f 1e 3c bf 6c 1b |h..nw.f.../.<.l.|
[3ad2 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 90 ae d6 b1 ae 37 4e d5 c3 4a 3d |0D. Q.....7N..J=|
00000010 58 a9 0b 94 ef 71 0b 43 24 0c b2 43 15 fe e4 e9 |X....q.C$..C....|
00000020 c7 80 e4 1c 02 20 25 d4 6b 65 4b ff ac 83 77 6d |..... %.keK...wm|
00000030 e5 22 c3 ae 69 6e 7e c0 c4 c9 b9 68 7b 1e 84 4f |."..in~....h{..O|
00000040 25 c6 4e 87 08 7b |%.N..{|
[3ad3 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3ad4 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4d5e0 gate 1582330502488899000 evaluation starts
[3ad5 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4d5e0 signed by 0 principal evaluation starts (used [false])
[3ad6 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4d5e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3ad7 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4d5e0 principal evaluation succeeds for identity 0
[3ad8 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4d5e0 gate 1582330502488899000 evaluation succeeds
[3ad9 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3ada 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3adb 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3adc 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3add 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes
[3ade 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes]}
[3adf 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:50
[3ae0 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:50
[3ae1 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[3ae2 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ae3 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ae4 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ae5 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[3ae6 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ae7 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ae8 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ae9 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[3aea 02-22 00:15:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[3aeb 02-22 00:15:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3aec 02-22 00:15:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3aed 02-22 00:15:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151031
[3aee 02-22 00:15:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E4911A9977E1C2BB717141F3169AA2560D97BFA931092E079D765643F3DD1001
[3aef 02-22 00:15:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[3af0 02-22 00:15:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[3af1 02-22 00:15:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3af2 02-22 00:15:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[3af3 02-22 00:15:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3af4 02-22 00:15:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[3af5 02-22 00:15:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[3af6 02-22 00:15:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[3af7 02-22 00:15:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3af8 02-22 00:15:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3af9 02-22 00:15:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3afa 02-22 00:15:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3afb 02-22 00:15:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3afc 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[3afd 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[3afe 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3aff 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[3b00 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[3b01 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b02 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3b03 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3b04 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3b05 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3b06 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3b07 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3b08 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 2e 29 db 13 16 fa 06 52 df 84 58 22 76 cb 3c |R.).....R..X"v.<|
00000010 68 a2 05 6e 77 c9 66 c4 2e f3 2f 1e 3c bf 6c 1b |h..nw.f.../.<.l.|
[3b09 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 90 ae d6 b1 ae 37 4e d5 c3 4a 3d |0D. Q.....7N..J=|
00000010 58 a9 0b 94 ef 71 0b 43 24 0c b2 43 15 fe e4 e9 |X....q.C$..C....|
00000020 c7 80 e4 1c 02 20 25 d4 6b 65 4b ff ac 83 77 6d |..... %.keK...wm|
00000030 e5 22 c3 ae 69 6e 7e c0 c4 c9 b9 68 7b 1e 84 4f |."..in~....h{..O|
00000040 25 c6 4e 87 08 7b |%.N..{|
[3b0a 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3b0b 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af56d0 gate 1582330502562567900 evaluation starts
[3b0c 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af56d0 signed by 0 principal evaluation starts (used [false])
[3b0d 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af56d0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3b0e 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af56d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3b0f 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af56d0 principal evaluation fails
[3b10 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af56d0 gate 1582330502562567900 evaluation fails
[3b11 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3b12 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[3b13 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3b14 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3b15 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 52 2e 29 db 13 16 fa 06 52 df 84 58 22 76 cb 3c |R.).....R..X"v.<|
00000010 68 a2 05 6e 77 c9 66 c4 2e f3 2f 1e 3c bf 6c 1b |h..nw.f.../.<.l.|
[3b16 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 90 ae d6 b1 ae 37 4e d5 c3 4a 3d |0D. Q.....7N..J=|
00000010 58 a9 0b 94 ef 71 0b 43 24 0c b2 43 15 fe e4 e9 |X....q.C$..C....|
00000020 c7 80 e4 1c 02 20 25 d4 6b 65 4b ff ac 83 77 6d |..... %.keK...wm|
00000030 e5 22 c3 ae 69 6e 7e c0 c4 c9 b9 68 7b 1e 84 4f |."..in~....h{..O|
00000040 25 c6 4e 87 08 7b |%.N..{|
[3b17 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3b18 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af5fd0 gate 1582330502565750000 evaluation starts
[3b19 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af5fd0 signed by 0 principal evaluation starts (used [false])
[3b1a 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af5fd0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3b1b 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af5fd0 principal evaluation succeeds for identity 0
[3b1c 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af5fd0 gate 1582330502565750000 evaluation succeeds
[3b1d 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3b1e 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3b1f 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3b20 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3b21 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes
[3b22 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b23 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[3b24 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 91 1a 99 77 e1 c2 bb 71 71 41 f3 16 9a a2 56 |....w...qqA....V|
00000010 0d 97 bf a9 31 09 2e 07 9d 76 56 43 f3 dd 10 01 |....1....vVC....|
[3b25 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 21 00 e0 6a 80 b8 7b 84 d3 13 f4 9a 53 |0D.!..j..{.....S|
00000010 fe d7 75 68 24 86 9d ef 6b d7 7d f0 bc ea 05 1d |..uh$...k.}.....|
00000020 02 e5 16 fe 85 02 1f 1e ad 6f da 84 8d 1b 7b d1 |.........o....{.|
00000030 1e b5 39 21 95 2a aa 0e 53 49 08 02 56 db 46 b8 |..9!.*..SI..V.F.|
00000040 ed 0a f1 f9 41 af |....A.|
[3b26 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3b27 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3b28 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b29 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[3b2a 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 29 b2 ae 51 77 6d 2a bf 36 dd 0e 81 9a 06 f9 |.)..Qwm*.6......|
00000010 f2 36 31 bb 5f 1b 1e 21 d7 37 72 a2 5e 11 18 bc |.61._..!.7r.^...|
[3b2b 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 6b e8 58 ef 85 5f df 71 9c 43 |0E.!..k.X.._.q.C|
00000010 37 26 b3 d4 45 9d d3 be 34 5e c6 94 29 a7 09 26 |7&..E...4^..)..&|
00000020 76 fb d4 8e 40 02 20 1a 7d aa 73 d7 aa 9f 28 56 |v...@. .}.s...(V|
00000030 4d 3c e8 05 2d ae 72 a5 a9 25 d0 8f 7c ba 08 26 |M<..-.r..%..|..&|
00000040 93 19 a4 98 99 82 fb |.......|
[3b2c 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3b2d 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b2e 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b30 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b31 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[3b2f 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[3b32 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[3b33 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b34 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3b35 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3b36 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3b37 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3b38 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3b39 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3b3a 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df ca d8 ea 4c cf 39 1c a4 af f7 2b 23 ca b8 8e |....L.9....+#...|
00000010 f7 b0 66 00 a4 32 47 ed 77 7c 1a a7 2a be 7e 4b |..f..2G.w|..*.~K|
[3b3b 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 1f 30 9b 32 92 b5 b4 3f 92 fd 3d |0D. >.0.2...?..=|
00000010 4c 18 7d 6e 60 8b 50 06 d0 cc e5 d4 d4 ec dd 88 |L.}n`.P.........|
00000020 eb c7 d7 57 02 20 0e 0c 5d 2d d9 87 95 21 82 b1 |...W. ..]-...!..|
00000030 5c 30 48 02 b4 0d e9 ff e4 18 5b c0 18 bc 99 9c |\0H.......[.....|
00000040 17 df d6 8d 2a 05 |....*.|
[3b3c 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3b3d 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39480 gate 1582330502568533200 evaluation starts
[3b3e 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39480 signed by 0 principal evaluation starts (used [false])
[3b3f 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39480 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3b40 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3b41 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39480 principal evaluation fails
[3b42 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39480 gate 1582330502568533200 evaluation fails
[3b43 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3b44 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3b45 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3b46 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df ca d8 ea 4c cf 39 1c a4 af f7 2b 23 ca b8 8e |....L.9....+#...|
00000010 f7 b0 66 00 a4 32 47 ed 77 7c 1a a7 2a be 7e 4b |..f..2G.w|..*.~K|
[3b47 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 1f 30 9b 32 92 b5 b4 3f 92 fd 3d |0D. >.0.2...?..=|
00000010 4c 18 7d 6e 60 8b 50 06 d0 cc e5 d4 d4 ec dd 88 |L.}n`.P.........|
00000020 eb c7 d7 57 02 20 0e 0c 5d 2d d9 87 95 21 82 b1 |...W. ..]-...!..|
00000030 5c 30 48 02 b4 0d e9 ff e4 18 5b c0 18 bc 99 9c |\0H.......[.....|
00000040 17 df d6 8d 2a 05 |....*.|
[3b48 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3b49 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39d90 gate 1582330502568939100 evaluation starts
[3b4a 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39d90 signed by 0 principal evaluation starts (used [false])
[3b4b 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39d90 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3b4c 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39d90 principal evaluation succeeds for identity 0
[3b4d 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39d90 gate 1582330502568939100 evaluation succeeds
[3b4e 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3b4f 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3b50 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3b51 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3b52 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes
[3b53 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b54 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[3b55 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 91 1a 99 77 e1 c2 bb 71 71 41 f3 16 9a a2 56 |....w...qqA....V|
00000010 0d 97 bf a9 31 09 2e 07 9d 76 56 43 f3 dd 10 01 |....1....vVC....|
[3b56 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 21 00 e0 6a 80 b8 7b 84 d3 13 f4 9a 53 |0D.!..j..{.....S|
00000010 fe d7 75 68 24 86 9d ef 6b d7 7d f0 bc ea 05 1d |..uh$...k.}.....|
00000020 02 e5 16 fe 85 02 1f 1e ad 6f da 84 8d 1b 7b d1 |.........o....{.|
00000030 1e b5 39 21 95 2a aa 0e 53 49 08 02 56 db 46 b8 |..9!.*..SI..V.F.|
00000040 ed 0a f1 f9 41 af |....A.|
[3b57 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3b58 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes
[3b59 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b5a 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[3b5b 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 29 b2 ae 51 77 6d 2a bf 36 dd 0e 81 9a 06 f9 |.)..Qwm*.6......|
00000010 f2 36 31 bb 5f 1b 1e 21 d7 37 72 a2 5e 11 18 bc |.61._..!.7r.^...|
[3b5c 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 6b e8 58 ef 85 5f df 71 9c 43 |0E.!..k.X.._.q.C|
00000010 37 26 b3 d4 45 9d d3 be 34 5e c6 94 29 a7 09 26 |7&..E...4^..)..&|
00000020 76 fb d4 8e 40 02 20 1a 7d aa 73 d7 aa 9f 28 56 |v...@. .}.s...(V|
00000030 4d 3c e8 05 2d ae 72 a5 a9 25 d0 8f 7c ba 08 26 |M<..-.r..%..|..&|
00000040 93 19 a4 98 99 82 fb |.......|
[3b5d 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[3b5e 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b5f 02-22 00:15:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b60 02-22 00:15:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b61 02-22 00:15:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[3b62 02-22 00:15:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[3b63 02-22 00:15:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 91 1a 99 77 e1 c2 bb 71 71 41 f3 16 9a a2 56 |....w...qqA....V|
00000010 0d 97 bf a9 31 09 2e 07 9d 76 56 43 f3 dd 10 01 |....1....vVC....|
[3b64 02-22 00:15:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 21 00 e0 6a 80 b8 7b 84 d3 13 f4 9a 53 |0D.!..j..{.....S|
00000010 fe d7 75 68 24 86 9d ef 6b d7 7d f0 bc ea 05 1d |..uh$...k.}.....|
00000020 02 e5 16 fe 85 02 1f 1e ad 6f da 84 8d 1b 7b d1 |.........o....{.|
00000030 1e b5 39 21 95 2a aa 0e 53 49 08 02 56 db 46 b8 |..9!.*..SI..V.F.|
00000040 ed 0a f1 f9 41 af |....A.|
[3b65 02-22 00:15:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[3b66 02-22 00:15:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 8b 80 8b e2 f8 45 03 f9 41 23 ab |0D. `.....E..A#.|
00000010 93 ff e0 7c be c5 58 be 47 8d 74 84 84 43 e7 1c |...|..X.G.t..C..|
00000020 de 9d 0b 4f 02 20 0c cb b5 f1 66 e6 5b 42 c0 5a |...O. ....f.[B.Z|
00000030 08 a8 47 9a 73 79 3e 6a d8 88 89 b1 34 cd c4 6a |..G.sy>j....4..j|
00000040 8e eb 10 15 93 2e |......|
[3b67 02-22 00:15:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3b68 02-22 00:15:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3b69 02-22 00:15:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b6a 02-22 00:15:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b6b 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b6c 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b6d 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[3b6e 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[3b6f 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b70 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[3b71 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b72 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[3b73 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3b74 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3b75 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b76 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b77 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b78 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3b79 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3b7a 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3b7b 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3b7c 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3b7d 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3b7e 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3b7f 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3b80 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3b81 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3a4a0 gate 1582330503044116500 evaluation starts
[3b82 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3a4a0 signed by 0 principal evaluation starts (used [false])
[3b83 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3a4a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3b84 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3a4a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3b85 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3a4a0 principal evaluation fails
[3b86 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3a4a0 gate 1582330503044116500 evaluation fails
[3b87 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3b88 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3b89 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3b8a 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3b8b 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3b8c 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3b8d 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3adb0 gate 1582330503044507600 evaluation starts
[3b8e 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3adb0 signed by 0 principal evaluation starts (used [false])
[3b8f 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3adb0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3b90 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3adb0 principal evaluation succeeds for identity 0
[3b91 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3adb0 gate 1582330503044507600 evaluation succeeds
[3b92 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3b93 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3b94 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3b95 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3b96 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[3b97 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[3b98 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[3b99 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[3b9a 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b9b 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3b9c 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3b9d 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3b9e 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3b9f 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3ba0 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3ba1 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3ba2 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[3ba3 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[3ba4 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3ba5 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51580 gate 1582330503045675600 evaluation starts
[3ba6 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51580 signed by 0 principal evaluation starts (used [false])
[3ba7 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51580 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3ba8 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3ba9 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51580 principal evaluation fails
[3baa 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51580 gate 1582330503045675600 evaluation fails
[3bab 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3bac 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3bad 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3bae 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[3baf 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[3bb0 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3bb1 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a2060 gate 1582330503046564800 evaluation starts
[3bb2 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a2060 signed by 0 principal evaluation starts (used [false])
[3bb3 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a2060 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3bb4 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a2060 principal evaluation succeeds for identity 0
[3bb5 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a2060 gate 1582330503046564800 evaluation succeeds
[3bb6 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3bb7 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3bb8 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3bb9 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3bba 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3bbb 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3bbc 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3bbd 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3bbe 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3bbf 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3bc0 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3bc1 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3bc2 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3bc3 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3bc4 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3bc5 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3bc6 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[3bc7 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[3bc8 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3bc9 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a3ed0 gate 1582330503048187100 evaluation starts
[3bca 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a3ed0 signed by 0 principal evaluation starts (used [false])
[3bcb 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a3ed0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3bcc 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a3ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3bcd 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a3ed0 principal evaluation fails
[3bce 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a3ed0 gate 1582330503048187100 evaluation fails
[3bcf 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3bd0 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3bd1 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3bd2 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[3bd3 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[3bd4 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3bd5 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355c7d0 gate 1582330503048576000 evaluation starts
[3bd6 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355c7d0 signed by 0 principal evaluation starts (used [false])
[3bd7 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355c7d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3bd8 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355c7d0 principal evaluation succeeds for identity 0
[3bd9 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355c7d0 gate 1582330503048576000 evaluation succeeds
[3bda 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3bdb 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3bdc 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3bdd 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3bde 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[3bdf 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[3be0 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3be1 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3be2 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3be3 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3be4 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3be5 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3be6 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3be7 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3be8 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3be9 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3bea 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3beb 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774900 gate 1582330503049883500 evaluation starts
[3bec 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774900 signed by 0 principal evaluation starts (used [false])
[3bed 02-22 00:15:03.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774900 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3bee 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3bef 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774900 principal evaluation fails
[3bf0 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774900 gate 1582330503049883500 evaluation fails
[3bf1 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3bf2 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3bf3 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3bf4 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3bf5 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3bf6 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3bf7 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003775200 gate 1582330503050394400 evaluation starts
[3bf8 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003775200 signed by 0 principal evaluation starts (used [false])
[3bf9 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003775200 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3bfa 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003775200 principal evaluation succeeds for identity 0
[3bfb 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003775200 gate 1582330503050394400 evaluation succeeds
[3bfc 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3bfd 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3bfe 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3bff 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3c00 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[3c01 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[3c02 02-22 00:15:03.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c03 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3c04 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[3c05 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[3c06 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[3c07 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[3c08 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c09 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c0a 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3c0b 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3c0c 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3c0d 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3c0e 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3c0f 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3c10 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3c11 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3c12 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3c13 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b7b40 gate 1582330503069152700 evaluation starts
[3c14 02-22 00:15:03.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b7b40 signed by 0 principal evaluation starts (used [false])
[3c15 02-22 00:15:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b7b40 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3c16 02-22 00:15:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b7b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3c17 02-22 00:15:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b7b40 principal evaluation fails
[3c18 02-22 00:15:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b7b40 gate 1582330503069152700 evaluation fails
[3c19 02-22 00:15:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3c1a 02-22 00:15:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3c1b 02-22 00:15:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3c1c 02-22 00:15:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3c1d 02-22 00:15:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3c1e 02-22 00:15:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3c1f 02-22 00:15:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878440 gate 1582330503078204200 evaluation starts
[3c20 02-22 00:15:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878440 signed by 0 principal evaluation starts (used [false])
[3c21 02-22 00:15:03.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878440 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3c22 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878440 principal evaluation succeeds for identity 0
[3c23 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878440 gate 1582330503078204200 evaluation succeeds
[3c24 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3c25 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3c26 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3c27 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3c28 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c29 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c2a 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3c2b 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3c2c 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3c2d 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3c2e 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3c2f 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3c30 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[3c31 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[3c32 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3c33 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879eb0 gate 1582330503083938000 evaluation starts
[3c34 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879eb0 signed by 0 principal evaluation starts (used [false])
[3c35 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879eb0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3c36 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3c37 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879eb0 principal evaluation fails
[3c38 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879eb0 gate 1582330503083938000 evaluation fails
[3c39 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3c3a 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3c3b 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3c3c 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[3c3d 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[3c3e 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3c3f 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b07c0 gate 1582330503084353200 evaluation starts
[3c40 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b07c0 signed by 0 principal evaluation starts (used [false])
[3c41 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b07c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3c42 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b07c0 principal evaluation succeeds for identity 0
[3c43 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b07c0 gate 1582330503084353200 evaluation succeeds
[3c44 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3c45 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3c46 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3c47 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3c48 02-22 00:15:03.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c49 02-22 00:15:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c4a 02-22 00:15:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c4b 02-22 00:15:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[3c4c 02-22 00:15:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c4d 02-22 00:15:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c4e 02-22 00:15:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12579928391274850317 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[3c4f 02-22 00:15:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12579928391274850317 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[3c50 02-22 00:15:03.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c51 02-22 00:15:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12579928391274850317 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[3c52 02-22 00:15:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12579928391274850317 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[3c53 02-22 00:15:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c54 02-22 00:15:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[3c55 02-22 00:15:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c56 02-22 00:15:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c57 02-22 00:15:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c58 02-22 00:15:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14948097518758390794 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[3c59 02-22 00:15:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14948097518758390794 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[3c5a 02-22 00:15:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[3c5b 02-22 00:15:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c5c 02-22 00:15:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[3c5d 02-22 00:15:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c5e 02-22 00:15:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c5f 02-22 00:15:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c60 02-22 00:15:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c61 02-22 00:15:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[3c62 02-22 00:15:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[3c63 02-22 00:15:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c64 02-22 00:15:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c65 02-22 00:15:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c66 02-22 00:15:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c67 02-22 00:15:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3c68 02-22 00:15:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c69 02-22 00:15:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3c6a 02-22 00:15:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[3c6b 02-22 00:15:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 fd 1c 7d 3a dc 83 5b 73 d8 fe 94 f3 41 9c 17 |...}:..[s....A..|
00000010 c7 1c 6d d7 59 23 5a c7 4c 87 20 27 ed 70 b2 f9 |..m.Y#Z.L. '.p..|
[3c6c 02-22 00:15:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 15 73 c5 10 90 3f 42 e4 a8 8b |0E.!...s...?B...|
00000010 31 23 a4 80 49 51 61 aa f2 0b 8b e8 29 d0 ed e4 |1#..IQa.....)...|
00000020 fd eb be db ed 02 20 66 ae e9 59 21 2b 7d 6c 34 |...... f..Y!+}l4|
00000030 cd 96 0e ab b1 b9 44 36 25 f3 dc 4b a4 3a 86 c3 |......D6%..K.:..|
00000040 50 53 82 dd da 8d 20 |PS.... |
[3c6d 02-22 00:15:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[3c6e 02-22 00:15:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 50 65 3f b8 49 14 aa 4e 74 bc |0E.!..Pe?.I..Nt.|
00000010 5c be d4 ff b1 84 0d 0f bb 54 a4 a0 f8 f5 f3 a2 |\........T......|
00000020 b9 15 23 59 4a 02 20 62 ae c8 cb c8 2d f7 89 b2 |..#YJ. b....-...|
00000030 21 1e 60 f6 ea 3c 9a 7a 52 00 1a da 13 57 9b 11 |!.`..<.zR....W..|
00000040 37 c5 93 5b 7e 92 96 |7..[~..|
[3c6f 02-22 00:15:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3c70 02-22 00:15:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[3c71 02-22 00:15:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:54
[3c72 02-22 00:15:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:54
[3c73 02-22 00:15:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[3c74 02-22 00:15:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c75 02-22 00:15:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c76 02-22 00:15:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c77 02-22 00:15:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c78 02-22 00:15:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c79 02-22 00:15:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c7a 02-22 00:15:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3c7b 02-22 00:15:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c7c 02-22 00:15:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3c7d 02-22 00:15:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes
[3c7e 02-22 00:15:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c7f 02-22 00:15:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes
[3c80 02-22 00:15:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c81 02-22 00:15:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes
[3c82 02-22 00:15:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes
[3c83 02-22 00:15:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c84 02-22 00:15:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes
[3c85 02-22 00:15:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c86 02-22 00:15:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes
[3c87 02-22 00:15:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c88 02-22 00:15:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes
[3c89 02-22 00:15:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c8a 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[3c8b 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[3c8c 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3c8d 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[3c8e 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[3c8f 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3c90 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3c91 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3c92 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3c93 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3c94 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3c95 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3c96 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 07 59 92 6f a1 80 df 36 d4 a2 cd 59 f4 d0 |...Y.o...6...Y..|
00000010 6f 85 9d 9f 1b cf b8 0f 9a 16 eb e2 81 42 c1 5c |o............B.\|
[3c97 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f cd 7d d6 2e 67 6a e9 58 b4 aa 88 |0D. o.}..gj.X...|
00000010 ae 64 ae c7 00 a1 d2 73 2f 6f 4e 75 fd 81 18 00 |.d.....s/oNu....|
00000020 76 46 1d 25 02 20 24 0f 82 16 54 1c be af 9f cd |vF.%. $...T.....|
00000030 a1 ac 80 73 58 88 31 01 cf 6f 74 fd b1 06 7e 9b |...sX.1..ot...~.|
00000040 9c e6 91 03 8a be |......|
[3c98 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3c99 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a176d0 gate 1582330504319333100 evaluation starts
[3c9a 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a176d0 signed by 0 principal evaluation starts (used [false])
[3c9b 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a176d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3c9c 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a176d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3c9d 02-22 00:15:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a176d0 principal evaluation fails
[3c9e 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a176d0 gate 1582330504319333100 evaluation fails
[3c9f 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3ca0 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3ca1 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3ca2 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 07 59 92 6f a1 80 df 36 d4 a2 cd 59 f4 d0 |...Y.o...6...Y..|
00000010 6f 85 9d 9f 1b cf b8 0f 9a 16 eb e2 81 42 c1 5c |o............B.\|
[3ca3 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f cd 7d d6 2e 67 6a e9 58 b4 aa 88 |0D. o.}..gj.X...|
00000010 ae 64 ae c7 00 a1 d2 73 2f 6f 4e 75 fd 81 18 00 |.d.....s/oNu....|
00000020 76 46 1d 25 02 20 24 0f 82 16 54 1c be af 9f cd |vF.%. $...T.....|
00000030 a1 ac 80 73 58 88 31 01 cf 6f 74 fd b1 06 7e 9b |...sX.1..ot...~.|
00000040 9c e6 91 03 8a be |......|
[3ca4 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3ca5 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a17fd0 gate 1582330504322152800 evaluation starts
[3ca6 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a17fd0 signed by 0 principal evaluation starts (used [false])
[3ca7 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a17fd0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3ca8 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a17fd0 principal evaluation succeeds for identity 0
[3ca9 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a17fd0 gate 1582330504322152800 evaluation succeeds
[3caa 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3cab 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3cac 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3cad 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3cae 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[3caf 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes]}
[3cb0 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:53
[3cb1 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:53
[3cb2 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[3cb3 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3cb4 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3cb6 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[3cb5 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3cb7 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[3cb8 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3cb9 02-22 00:15:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3cba 02-22 00:15:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cbb 02-22 00:15:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cbc 02-22 00:15:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cbd 02-22 00:15:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cbe 02-22 00:15:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cbf 02-22 00:15:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cc0 02-22 00:15:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cc1 02-22 00:15:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3cc2 02-22 00:15:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cc3 02-22 00:15:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3cc4 02-22 00:15:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[3cc5 02-22 00:15:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3cc6 02-22 00:15:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[3cc7 02-22 00:15:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3cc8 02-22 00:15:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[3cc9 02-22 00:15:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3cca 02-22 00:15:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[3ccb 02-22 00:15:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ccc 02-22 00:15:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[3ccd 02-22 00:15:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[3cce 02-22 00:15:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510111801
[3ccf 02-22 00:15:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7F6D2E60DCA97B59C496AA2F86BBF9608010644BCC583F68DCEFA49FC87FD1F0
[3cd0 02-22 00:15:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[3cd1 02-22 00:15:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cd2 02-22 00:15:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cd3 02-22 00:15:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cd4 02-22 00:15:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cd5 02-22 00:15:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:17 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[3cd6 02-22 00:15:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cd7 02-22 00:15:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cd8 02-22 00:15:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:17 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[3cd9 02-22 00:15:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3cda 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes
[3cdb 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3cdc 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes
[3cdd 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[3cde 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3cdf 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3ce0 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3ce1 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3ce2 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3ce3 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3ce4 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3ce5 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 68 f0 7f 6d bc 2b 75 1b 87 7f 38 a7 c9 6e 82 |Gh..m.+u...8..n.|
00000010 11 79 d1 cf 80 08 14 f2 b1 16 08 57 11 48 7f e2 |.y.........W.H..|
[3ce6 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 72 51 aa 64 49 71 35 8c 2b 14 |0E.!..rQ.dIq5.+.|
00000010 0d c0 a9 12 4c ae 1f b3 b9 1a 09 00 c1 60 8f 46 |....L........`.F|
00000020 de bb 71 56 e0 02 20 59 c7 0b 30 9c 95 04 e8 a1 |..qV.. Y..0.....|
00000030 50 d7 eb 7a 42 d3 60 3c f6 d5 5a 5d d1 46 8f 56 |P..zB.`<..Z].F.V|
00000040 ed b6 23 fd e3 9d cc |..#....|
[3ce7 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3ce8 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0c1b0 gate 1582330504375775300 evaluation starts
[3ce9 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0c1b0 signed by 0 principal evaluation starts (used [false])
[3cea 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0c1b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3ceb 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0c1b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3cec 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0c1b0 principal evaluation fails
[3ced 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0c1b0 gate 1582330504375775300 evaluation fails
[3cee 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3cef 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3cf0 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3cf1 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 68 f0 7f 6d bc 2b 75 1b 87 7f 38 a7 c9 6e 82 |Gh..m.+u...8..n.|
00000010 11 79 d1 cf 80 08 14 f2 b1 16 08 57 11 48 7f e2 |.y.........W.H..|
[3cf2 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 72 51 aa 64 49 71 35 8c 2b 14 |0E.!..rQ.dIq5.+.|
00000010 0d c0 a9 12 4c ae 1f b3 b9 1a 09 00 c1 60 8f 46 |....L........`.F|
00000020 de bb 71 56 e0 02 20 59 c7 0b 30 9c 95 04 e8 a1 |..qV.. Y..0.....|
00000030 50 d7 eb 7a 42 d3 60 3c f6 d5 5a 5d d1 46 8f 56 |P..zB.`<..Z].F.V|
00000040 ed b6 23 fd e3 9d cc |..#....|
[3cf3 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3cf4 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0cab0 gate 1582330504376243900 evaluation starts
[3cf5 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0cab0 signed by 0 principal evaluation starts (used [false])
[3cf6 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0cab0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3cf7 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0cab0 principal evaluation succeeds for identity 0
[3cf8 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0cab0 gate 1582330504376243900 evaluation succeeds
[3cf9 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3cfa 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3cfb 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3cfc 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3cfd 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes
[3cfe 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes]}
[3cff 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:51
[3d00 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:51
[3d01 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[3d02 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d03 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d04 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d05 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d06 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d07 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d08 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d09 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d0a 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d0b 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d0c 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3d0d 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d0e 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3d0f 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes
[3d10 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d11 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes
[3d12 02-22 00:15:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d13 02-22 00:15:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes
[3d14 02-22 00:15:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes
[3d15 02-22 00:15:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d16 02-22 00:15:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes
[3d17 02-22 00:15:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d18 02-22 00:15:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes
[3d19 02-22 00:15:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d1a 02-22 00:15:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes
[3d1b 02-22 00:15:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d1c 02-22 00:15:04.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151032
[3d1d 02-22 00:15:04.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DE927DC016DF8E5C9D54CC89C82D605F6BCCE9E84F70DBF8FF725992F5A2C351
[3d1e 02-22 00:15:04.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[3d1f 02-22 00:15:04.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[3d20 02-22 00:15:04.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[3d21 02-22 00:15:04.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d22 02-22 00:15:04.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d23 02-22 00:15:04.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d24 02-22 00:15:04.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3d25 02-22 00:15:04.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d26 02-22 00:15:04.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3d27 02-22 00:15:04.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[3d28 02-22 00:15:04.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3d29 02-22 00:15:04.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d2a 02-22 00:15:04.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes
[3d2b 02-22 00:15:04.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d2c 02-22 00:15:04.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes
[3d2d 02-22 00:15:04.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d2e 02-22 00:15:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:8739652313896583949 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3d2f 02-22 00:15:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:8739652313896583949 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3d30 02-22 00:15:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d31 02-22 00:15:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d32 02-22 00:15:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d33 02-22 00:15:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d34 02-22 00:15:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d35 02-22 00:15:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d36 02-22 00:15:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[3d37 02-22 00:15:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d38 02-22 00:15:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[3d3a 02-22 00:15:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[3d3b 02-22 00:15:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[3d39 02-22 00:15:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d3c 02-22 00:15:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ca d3 64 14 bb 46 06 cc f3 dc 54 70 ca da b0 37 |..d..F....Tp...7|
00000010 90 1a 0d dc c1 43 33 2d b9 d1 7e 81 bd 2a 54 5b |.....C3-..~..*T[|
[3d3d 02-22 00:15:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 20 18 77 df 67 87 56 8c e9 16 23 |0D. v .w.g.V...#|
00000010 fb 1a ce 58 bc be 6e 1c 04 51 a8 e1 25 60 ea e8 |...X..n..Q..%`..|
00000020 1d 18 89 3c 02 20 20 2f 8f 98 f0 6e 86 82 06 37 |...<. /...n...7|
00000030 9c ed 01 96 7c 9e 21 57 3d de d3 f7 6c 81 7d 01 |....|.!W=...l.}.|
00000040 da 10 b2 2b be 46 |...+.F|
[3d3e 02-22 00:15:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[3d3f 02-22 00:15:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 01 7a 94 e3 cb ea 40 7f 84 e4 |0E.!...z....@...|
00000010 99 d5 31 05 c7 cd 2c 75 7c 89 b4 1b 2d 8b 68 52 |..1...,u|...-.hR|
00000020 a0 27 5b 4f e2 02 20 6f 66 0b 51 08 b1 5e c1 88 |.'[O.. of.Q..^..|
00000030 e6 f7 6d 71 21 9b a6 ee e9 ed 9e 28 5b 77 6b ea |..mq!......([wk.|
00000040 b2 e6 e1 e9 a2 9a 9a |.......|
[3d40 02-22 00:15:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[3d41 02-22 00:15:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[3d42 02-22 00:15:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:55
[3d43 02-22 00:15:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:55
[3d44 02-22 00:15:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[3d45 02-22 00:15:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d46 02-22 00:15:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d47 02-22 00:15:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d48 02-22 00:15:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[3d49 02-22 00:15:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d4a 02-22 00:15:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d4b 02-22 00:15:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[3d4c 02-22 00:15:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[3d4d 02-22 00:15:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[3d4e 02-22 00:15:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d4f 02-22 00:15:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:2355039827294485557 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3d50 02-22 00:15:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:2355039827294485557 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3d51 02-22 00:15:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[3d52 02-22 00:15:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d53 02-22 00:15:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:4789858622285520537 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3d54 02-22 00:15:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:4789858622285520537 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3d55 02-22 00:15:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:4789858622285520537 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3d56 02-22 00:15:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d57 02-22 00:15:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d58 02-22 00:15:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d59 02-22 00:15:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d5a 02-22 00:15:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d5b 02-22 00:15:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d5c 02-22 00:15:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[3d5d 02-22 00:15:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d5e 02-22 00:15:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[3d5f 02-22 00:15:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:12770504447984056808 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[3d60 02-22 00:15:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[3d61 02-22 00:15:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:14238829725107645744 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[3d62 02-22 00:15:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[3d63 02-22 00:15:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:4312449346022912094 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[3d64 02-22 00:15:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:4312449346022912094 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[3d65 02-22 00:15:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d66 02-22 00:15:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:12770504447984056808 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3d67 02-22 00:15:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d68 02-22 00:15:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:14238829725107645744 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[3d69 02-22 00:15:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d6a 02-22 00:15:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12770504447984056808 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[3d6b 02-22 00:15:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12770504447984056808 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[3d6c 02-22 00:15:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d6d 02-22 00:15:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14238829725107645744 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[3d6e 02-22 00:15:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14238829725107645744 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[3d6f 02-22 00:15:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14238829725107645744 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[3d70 02-22 00:15:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d71 02-22 00:15:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4312449346022912094 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[3d72 02-22 00:15:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4312449346022912094 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[3d73 02-22 00:15:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d74 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3d75 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3d76 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d77 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[3d78 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[3d79 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3d7a 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3d7b 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3d7c 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3d7d 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3d7e 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3d7f 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3d80 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 49 f1 e1 d4 6c 09 62 32 46 9c 57 2d 4d 8e 39 |.I...l.b2F.W-M.9|
00000010 e4 34 02 20 32 f9 9b e1 5d 91 3c 88 c4 01 5e 7b |.4. 2...].<...^{|
[3d81 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 3c 97 fc 8a e5 a7 b8 ac 06 4a |0E.!..<........J|
00000010 98 53 42 63 49 50 f1 7b a1 e2 08 97 95 3f 49 e8 |.SBcIP.{.....?I.|
00000020 6f 6e 83 80 5c 02 20 2f c1 4a 8f 5e b3 0f b9 d2 |on..\. /.J.^....|
00000030 92 04 c1 8b fc ed c9 bc 27 08 e8 d2 9d 77 0e cf |........'....w..|
00000040 46 5d 0a 4d 93 32 b4 |F].M.2.|
[3d82 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3d83 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f80170 gate 1582330506468438100 evaluation starts
[3d84 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f80170 signed by 0 principal evaluation starts (used [false])
[3d85 02-22 00:15:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f80170 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3d87 02-22 00:15:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f80170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3d86 02-22 00:15:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3d88 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f80170 principal evaluation fails
[3d89 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f80170 gate 1582330506468438100 evaluation fails
[3d8a 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3d8b 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3d8c 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3d8d 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 49 f1 e1 d4 6c 09 62 32 46 9c 57 2d 4d 8e 39 |.I...l.b2F.W-M.9|
00000010 e4 34 02 20 32 f9 9b e1 5d 91 3c 88 c4 01 5e 7b |.4. 2...].<...^{|
[3d8e 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 3c 97 fc 8a e5 a7 b8 ac 06 4a |0E.!..<........J|
00000010 98 53 42 63 49 50 f1 7b a1 e2 08 97 95 3f 49 e8 |.SBcIP.{.....?I.|
00000020 6f 6e 83 80 5c 02 20 2f c1 4a 8f 5e b3 0f b9 d2 |on..\. /.J.^....|
00000030 92 04 c1 8b fc ed c9 bc 27 08 e8 d2 9d 77 0e cf |........'....w..|
00000040 46 5d 0a 4d 93 32 b4 |F].M.2.|
[3d8f 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3d90 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f809f0 gate 1582330506489308700 evaluation starts
[3d91 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f809f0 signed by 0 principal evaluation starts (used [false])
[3d92 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f809f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3d93 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f809f0 principal evaluation succeeds for identity 0
[3d94 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f809f0 gate 1582330506489308700 evaluation succeeds
[3d95 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3d96 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3d97 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3d98 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3d99 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes
[3d9a 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes]}
[3d9b 02-22 00:15:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:54
[3d9c 02-22 00:15:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:54
[3d9d 02-22 00:15:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[3d9e 02-22 00:15:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3d9f 02-22 00:15:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3da0 02-22 00:15:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3da1 02-22 00:15:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[3da2 02-22 00:15:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3da3 02-22 00:15:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3da4 02-22 00:15:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3da5 02-22 00:15:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[3da6 02-22 00:15:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[3da7 02-22 00:15:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3da8 02-22 00:15:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3da9 02-22 00:15:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3daa 02-22 00:15:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3dab 02-22 00:15:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[3dac 02-22 00:15:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3dad 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3dae 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3daf 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3db0 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3db1 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3db2 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3db3 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 b8 38 05 0b 77 99 d0 68 02 f0 20 23 6b ab 98 |..8..w..h.. #k..|
00000010 d9 13 b0 39 92 b9 11 80 03 93 08 eb dd ed 1b 8a |...9............|
[3db4 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 3d 83 e3 b0 d1 8f e8 52 a9 c4 0b |0D. .=......R...|
00000010 c0 31 51 b1 a2 31 ce 40 24 cd 6b f3 4d e1 42 6b |.1Q..1.@$.k.M.Bk|
00000020 c3 e5 01 da 02 20 2d 96 50 89 a0 fb 17 48 ae 4d |..... -.P....H.M|
00000030 d3 45 07 62 44 5e e6 fe 04 6f 97 ad 1d af f5 bd |.E.bD^...o......|
00000040 70 3b bd 1a ab e5 |p;....|
[3db5 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3db6 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9cdc0 gate 1582330506504644000 evaluation starts
[3db7 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9cdc0 signed by 0 principal evaluation starts (used [false])
[3db8 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9cdc0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3db9 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9cdc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3dba 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9cdc0 principal evaluation fails
[3dbb 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9cdc0 gate 1582330506504644000 evaluation fails
[3dbc 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3dbd 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3dbe 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3dbf 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 b8 38 05 0b 77 99 d0 68 02 f0 20 23 6b ab 98 |..8..w..h.. #k..|
00000010 d9 13 b0 39 92 b9 11 80 03 93 08 eb dd ed 1b 8a |...9............|
[3dc0 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 3d 83 e3 b0 d1 8f e8 52 a9 c4 0b |0D. .=......R...|
00000010 c0 31 51 b1 a2 31 ce 40 24 cd 6b f3 4d e1 42 6b |.1Q..1.@$.k.M.Bk|
00000020 c3 e5 01 da 02 20 2d 96 50 89 a0 fb 17 48 ae 4d |..... -.P....H.M|
00000030 d3 45 07 62 44 5e e6 fe 04 6f 97 ad 1d af f5 bd |.E.bD^...o......|
00000040 70 3b bd 1a ab e5 |p;....|
[3dc1 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3dc2 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9d6c0 gate 1582330506507655300 evaluation starts
[3dc3 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9d6c0 signed by 0 principal evaluation starts (used [false])
[3dc4 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9d6c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3dc5 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9d6c0 principal evaluation succeeds for identity 0
[3dc6 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f9d6c0 gate 1582330506507655300 evaluation succeeds
[3dc7 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3dc8 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3dc9 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3dca 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3dcb 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes
[3dcc 02-22 00:15:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes]}
[3dcd 02-22 00:15:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:52
[3dce 02-22 00:15:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:52
[3dcf 02-22 00:15:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[3dd0 02-22 00:15:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3dd1 02-22 00:15:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3dd2 02-22 00:15:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[3dd3 02-22 00:15:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3dd4 02-22 00:15:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3dd5 02-22 00:15:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3dd6 02-22 00:15:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[3dd7 02-22 00:15:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[3dd8 02-22 00:15:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[3dd9 02-22 00:15:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3dda 02-22 00:15:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ddb 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151033
[3ddc 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5C06FFB5A64E2B92EF39DDD36C49AA4334E667AE58FE0F19B51960B0BE1BF60F
[3ddd 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[3dde 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[3ddf 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3de0 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[3de1 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[3de2 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3de3 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[3de4 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3de5 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[3de6 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3de7 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3de8 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[3dea 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[3deb 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[3dec 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ded 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[3dee 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[3de9 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3def 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[3df0 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3df1 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3df2 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3df3 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3df4 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3df5 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3df6 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3df7 02-22 00:15:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 b8 38 05 0b 77 99 d0 68 02 f0 20 23 6b ab 98 |..8..w..h.. #k..|
00000010 d9 13 b0 39 92 b9 11 80 03 93 08 eb dd ed 1b 8a |...9............|
[3df8 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 3d 83 e3 b0 d1 8f e8 52 a9 c4 0b |0D. .=......R...|
00000010 c0 31 51 b1 a2 31 ce 40 24 cd 6b f3 4d e1 42 6b |.1Q..1.@$.k.M.Bk|
00000020 c3 e5 01 da 02 20 2d 96 50 89 a0 fb 17 48 ae 4d |..... -.P....H.M|
00000030 d3 45 07 62 44 5e e6 fe 04 6f 97 ad 1d af f5 bd |.E.bD^...o......|
00000040 70 3b bd 1a ab e5 |p;....|
[3df9 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3dfa 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc5640 gate 1582330506560175100 evaluation starts
[3dfb 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc5640 signed by 0 principal evaluation starts (used [false])
[3dfc 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc5640 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3dfd 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc5640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3dfe 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc5640 principal evaluation fails
[3dff 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc5640 gate 1582330506560175100 evaluation fails
[3e00 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3e01 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3e02 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3e03 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 b8 38 05 0b 77 99 d0 68 02 f0 20 23 6b ab 98 |..8..w..h.. #k..|
00000010 d9 13 b0 39 92 b9 11 80 03 93 08 eb dd ed 1b 8a |...9............|
[3e04 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 3d 83 e3 b0 d1 8f e8 52 a9 c4 0b |0D. .=......R...|
00000010 c0 31 51 b1 a2 31 ce 40 24 cd 6b f3 4d e1 42 6b |.1Q..1.@$.k.M.Bk|
00000020 c3 e5 01 da 02 20 2d 96 50 89 a0 fb 17 48 ae 4d |..... -.P....H.M|
00000030 d3 45 07 62 44 5e e6 fe 04 6f 97 ad 1d af f5 bd |.E.bD^...o......|
00000040 70 3b bd 1a ab e5 |p;....|
[3e05 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3e06 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc5f40 gate 1582330506560578400 evaluation starts
[3e07 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc5f40 signed by 0 principal evaluation starts (used [false])
[3e08 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc5f40 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3e09 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc5f40 principal evaluation succeeds for identity 0
[3e0a 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc5f40 gate 1582330506560578400 evaluation succeeds
[3e0b 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3e0c 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3e0d 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3e0e 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3e0f 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes
[3e10 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e11 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[3e12 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 06 ff b5 a6 4e 2b 92 ef 39 dd d3 6c 49 aa 43 |\....N+..9..lI.C|
00000010 34 e6 67 ae 58 fe 0f 19 b5 19 60 b0 be 1b f6 0f |4.g.X.....`.....|
[3e13 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 25 19 c0 4f 9b d2 01 e9 b6 60 52 |0D. .%..O.....`R|
00000010 7f 30 09 7e 83 8e f6 67 ce d0 76 7e 9a 2e ce c6 |.0.~...g..v~....|
00000020 62 70 15 e0 02 20 50 0e 64 a2 71 0b f3 1c 0b c2 |bp... P.d.q.....|
00000030 22 40 18 ba 15 09 7d bc 07 11 f1 5d 3e 39 b1 55 |"@....}....]>9.U|
00000040 39 85 3e bf ac 91 |9.>...|
[3e14 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3e15 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3e16 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e17 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[3e18 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ca d3 64 14 bb 46 06 cc f3 dc 54 70 ca da b0 37 |..d..F....Tp...7|
00000010 90 1a 0d dc c1 43 33 2d b9 d1 7e 81 bd 2a 54 5b |.....C3-..~..*T[|
[3e19 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 20 18 77 df 67 87 56 8c e9 16 23 |0D. v .w.g.V...#|
00000010 fb 1a ce 58 bc be 6e 1c 04 51 a8 e1 25 60 ea e8 |...X..n..Q..%`..|
00000020 1d 18 89 3c 02 20 20 2f 8f 98 f0 6e 86 82 06 37 |...<. /...n...7|
00000030 9c ed 01 96 7c 9e 21 57 3d de d3 f7 6c 81 7d 01 |....|.!W=...l.}.|
00000040 da 10 b2 2b be 46 |...+.F|
[3e1a 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3e1b 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e1c 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e1d 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[3e1e 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[3e1f 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 06 ff b5 a6 4e 2b 92 ef 39 dd d3 6c 49 aa 43 |\....N+..9..lI.C|
00000010 34 e6 67 ae 58 fe 0f 19 b5 19 60 b0 be 1b f6 0f |4.g.X.....`.....|
[3e20 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 25 19 c0 4f 9b d2 01 e9 b6 60 52 |0D. .%..O.....`R|
00000010 7f 30 09 7e 83 8e f6 67 ce d0 76 7e 9a 2e ce c6 |.0.~...g..v~....|
00000020 62 70 15 e0 02 20 50 0e 64 a2 71 0b f3 1c 0b c2 |bp... P.d.q.....|
00000030 22 40 18 ba 15 09 7d bc 07 11 f1 5d 3e 39 b1 55 |"@....}....]>9.U|
00000040 39 85 3e bf ac 91 |9.>...|
[3e21 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e22 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[3e23 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d b5 8e 1f d9 4c 19 2b c9 5d df bf |0D. .....L.+.]..|
00000010 b2 9c fb 88 f7 85 e9 ca f2 cd df d8 f9 2e 19 e6 |................|
00000020 a4 6a 31 45 02 20 05 42 60 a3 d9 be 5b d5 b7 e1 |.j1E. .B`...[...|
00000030 b9 23 f6 6f 43 a9 c9 e0 7a 0e 5a fe 36 6c 38 03 |.#.oC...z.Z.6l8.|
00000040 cd 70 5d 73 31 57 |.p]s1W|
[3e24 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3e25 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3e26 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e27 02-22 00:15:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e28 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3e29 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e2a 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[3e2b 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[3e2c 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 06 ff b5 a6 4e 2b 92 ef 39 dd d3 6c 49 aa 43 |\....N+..9..lI.C|
00000010 34 e6 67 ae 58 fe 0f 19 b5 19 60 b0 be 1b f6 0f |4.g.X.....`.....|
[3e2d 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 25 19 c0 4f 9b d2 01 e9 b6 60 52 |0D. .%..O.....`R|
00000010 7f 30 09 7e 83 8e f6 67 ce d0 76 7e 9a 2e ce c6 |.0.~...g..v~....|
00000020 62 70 15 e0 02 20 50 0e 64 a2 71 0b f3 1c 0b c2 |bp... P.d.q.....|
00000030 22 40 18 ba 15 09 7d bc 07 11 f1 5d 3e 39 b1 55 |"@....}....]>9.U|
00000040 39 85 3e bf ac 91 |9.>...|
[3e2e 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3e2f 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes
[3e30 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e31 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[3e32 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ca d3 64 14 bb 46 06 cc f3 dc 54 70 ca da b0 37 |..d..F....Tp...7|
00000010 90 1a 0d dc c1 43 33 2d b9 d1 7e 81 bd 2a 54 5b |.....C3-..~..*T[|
[3e33 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 20 18 77 df 67 87 56 8c e9 16 23 |0D. v .w.g.V...#|
00000010 fb 1a ce 58 bc be 6e 1c 04 51 a8 e1 25 60 ea e8 |...X..n..Q..%`..|
00000020 1d 18 89 3c 02 20 20 2f 8f 98 f0 6e 86 82 06 37 |...<. /...n...7|
00000030 9c ed 01 96 7c 9e 21 57 3d de d3 f7 6c 81 7d 01 |....|.!W=...l.}.|
00000040 da 10 b2 2b be 46 |...+.F|
[3e34 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes
[3e35 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e36 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[3e37 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e38 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3e39 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3e3a 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3e3b 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3e3c 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3e3d 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3e3e 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 49 f1 e1 d4 6c 09 62 32 46 9c 57 2d 4d 8e 39 |.I...l.b2F.W-M.9|
00000010 e4 34 02 20 32 f9 9b e1 5d 91 3c 88 c4 01 5e 7b |.4. 2...].<...^{|
[3e3f 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 3c 97 fc 8a e5 a7 b8 ac 06 4a |0E.!..<........J|
00000010 98 53 42 63 49 50 f1 7b a1 e2 08 97 95 3f 49 e8 |.SBcIP.{.....?I.|
00000020 6f 6e 83 80 5c 02 20 2f c1 4a 8f 5e b3 0f b9 d2 |on..\. /.J.^....|
00000030 92 04 c1 8b fc ed c9 bc 27 08 e8 d2 9d 77 0e cf |........'....w..|
00000040 46 5d 0a 4d 93 32 b4 |F].M.2.|
[3e40 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3e41 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301a1c0 gate 1582330506574603000 evaluation starts
[3e42 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301a1c0 signed by 0 principal evaluation starts (used [false])
[3e43 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301a1c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3e44 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301a1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3e45 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301a1c0 principal evaluation fails
[3e46 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301a1c0 gate 1582330506574603000 evaluation fails
[3e47 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3e48 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3e49 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3e4a 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 49 f1 e1 d4 6c 09 62 32 46 9c 57 2d 4d 8e 39 |.I...l.b2F.W-M.9|
00000010 e4 34 02 20 32 f9 9b e1 5d 91 3c 88 c4 01 5e 7b |.4. 2...].<...^{|
[3e4b 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 3c 97 fc 8a e5 a7 b8 ac 06 4a |0E.!..<........J|
00000010 98 53 42 63 49 50 f1 7b a1 e2 08 97 95 3f 49 e8 |.SBcIP.{.....?I.|
00000020 6f 6e 83 80 5c 02 20 2f c1 4a 8f 5e b3 0f b9 d2 |on..\. /.J.^....|
00000030 92 04 c1 8b fc ed c9 bc 27 08 e8 d2 9d 77 0e cf |........'....w..|
00000040 46 5d 0a 4d 93 32 b4 |F].M.2.|
[3e4c 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3e4d 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301aac0 gate 1582330506577498300 evaluation starts
[3e4e 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301aac0 signed by 0 principal evaluation starts (used [false])
[3e4f 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301aac0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3e50 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301aac0 principal evaluation succeeds for identity 0
[3e51 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301aac0 gate 1582330506577498300 evaluation succeeds
[3e52 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3e53 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3e54 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3e55 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3e56 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes
[3e57 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e58 02-22 00:15:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e59 02-22 00:15:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e5a 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e5b 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[3e5c 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[3e5d 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e5e 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[3e5f 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e60 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[3e61 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3e62 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3e63 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3e64 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[3e65 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[3e66 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[3e67 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[3e68 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e69 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e6a 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3e6b 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3e6c 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3e6d 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3e6e 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3e6f 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3e70 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3e71 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3e72 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3e73 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071150 gate 1582330507049237300 evaluation starts
[3e74 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071150 signed by 0 principal evaluation starts (used [false])
[3e75 02-22 00:15:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071150 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3e76 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3e77 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071150 principal evaluation fails
[3e78 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071150 gate 1582330507049237300 evaluation fails
[3e79 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3e7a 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3e7b 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3e7c 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3e7d 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3e7e 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3e7f 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071a50 gate 1582330507051942600 evaluation starts
[3e80 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071a50 signed by 0 principal evaluation starts (used [false])
[3e81 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071a50 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3e82 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071a50 principal evaluation succeeds for identity 0
[3e83 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003071a50 gate 1582330507051942600 evaluation succeeds
[3e84 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3e85 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3e86 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3e87 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3e88 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e89 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3e8a 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3e8b 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3e8c 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3e8d 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3e8e 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3e8f 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3e90 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[3e91 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[3e92 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3e93 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308b4b0 gate 1582330507054705900 evaluation starts
[3e94 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308b4b0 signed by 0 principal evaluation starts (used [false])
[3e95 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308b4b0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3e96 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308b4b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3e97 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308b4b0 principal evaluation fails
[3e98 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308b4b0 gate 1582330507054705900 evaluation fails
[3e99 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3e9a 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3e9b 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3e9c 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[3e9d 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[3e9e 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3e9f 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308bdb0 gate 1582330507056224700 evaluation starts
[3ea0 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308bdb0 signed by 0 principal evaluation starts (used [false])
[3ea1 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308bdb0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3ea2 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308bdb0 principal evaluation succeeds for identity 0
[3ea3 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308bdb0 gate 1582330507056224700 evaluation succeeds
[3ea4 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3ea5 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3ea6 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3ea7 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3ea8 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ea9 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3eaa 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3eab 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3eac 02-22 00:15:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ead 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3eae 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3eaf 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3eb0 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3eb1 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3eb2 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3eb3 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[3eb4 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[3eb5 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3eb6 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309fac0 gate 1582330507061929200 evaluation starts
[3eb7 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309fac0 signed by 0 principal evaluation starts (used [false])
[3eb8 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309fac0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3eb9 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309fac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3eba 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309fac0 principal evaluation fails
[3ebb 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309fac0 gate 1582330507061929200 evaluation fails
[3ebc 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3ebd 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3ebe 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3ebf 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[3ec0 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[3ec1 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3ec2 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030b23c0 gate 1582330507063692600 evaluation starts
[3ec3 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030b23c0 signed by 0 principal evaluation starts (used [false])
[3ec4 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030b23c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3ec5 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030b23c0 principal evaluation succeeds for identity 0
[3ec6 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030b23c0 gate 1582330507063692600 evaluation succeeds
[3ec7 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3ec8 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3ec9 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3eca 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3ecb 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[3ecc 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[3ecd 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ece 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ecf 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3ed0 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3ed1 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3ed2 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3ed3 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3ed4 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3ed5 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3ed6 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3ed7 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3ed8 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c64d0 gate 1582330507067893000 evaluation starts
[3ed9 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c64d0 signed by 0 principal evaluation starts (used [false])
[3eda 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c64d0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3edb 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c64d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3edc 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c64d0 principal evaluation fails
[3edd 02-22 00:15:07.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c64d0 gate 1582330507067893000 evaluation fails
[3ede 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3edf 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3ee0 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3ee1 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3ee2 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3ee3 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3ee4 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c6dd0 gate 1582330507071632100 evaluation starts
[3ee5 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c6dd0 signed by 0 principal evaluation starts (used [false])
[3ee6 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c6dd0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3ee7 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c6dd0 principal evaluation succeeds for identity 0
[3ee8 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c6dd0 gate 1582330507071632100 evaluation succeeds
[3ee9 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3eea 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3eeb 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3eec 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3eed 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[3eee 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[3eef 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ef0 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[3ef1 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ef2 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ef3 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ef4 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3ef5 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3ef6 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3ef7 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3ef8 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3ef9 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3efa 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3efb 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3efc 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3efd 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d9190 gate 1582330507076185500 evaluation starts
[3efe 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d9190 signed by 0 principal evaluation starts (used [false])
[3eff 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d9190 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3f00 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d9190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3f01 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d9190 principal evaluation fails
[3f02 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d9190 gate 1582330507076185500 evaluation fails
[3f03 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3f04 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3f05 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3f06 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[3f07 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[3f08 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3f09 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d9a90 gate 1582330507078046800 evaluation starts
[3f0a 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d9a90 signed by 0 principal evaluation starts (used [false])
[3f0b 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d9a90 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3f0c 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d9a90 principal evaluation succeeds for identity 0
[3f0d 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d9a90 gate 1582330507078046800 evaluation succeeds
[3f0e 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3f0f 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3f10 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3f11 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3f12 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[3f13 02-22 00:15:07.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[3f14 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[3f15 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[3f16 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f17 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f18 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3f19 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3f1a 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3f1b 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3f1c 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3f1d 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3f1e 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[3f1f 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[3f20 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3f21 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104250 gate 1582330507085068000 evaluation starts
[3f22 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104250 signed by 0 principal evaluation starts (used [false])
[3f23 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104250 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3f24 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3f25 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104250 principal evaluation fails
[3f26 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104250 gate 1582330507085068000 evaluation fails
[3f27 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3f28 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3f29 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3f2a 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[3f2b 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[3f2c 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3f2d 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104b50 gate 1582330507087131300 evaluation starts
[3f2e 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104b50 signed by 0 principal evaluation starts (used [false])
[3f2f 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104b50 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3f30 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104b50 principal evaluation succeeds for identity 0
[3f31 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003104b50 gate 1582330507087131300 evaluation succeeds
[3f32 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3f33 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3f34 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3f35 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3f36 02-22 00:15:07.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f37 02-22 00:15:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f38 02-22 00:15:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f39 02-22 00:15:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[3f3a 02-22 00:15:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f3b 02-22 00:15:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f3c 02-22 00:15:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6345812702186575247 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[3f3d 02-22 00:15:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6345812702186575247 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[3f3e 02-22 00:15:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f3f 02-22 00:15:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6345812702186575247 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[3f40 02-22 00:15:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6345812702186575247 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[3f41 02-22 00:15:07.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f42 02-22 00:15:07.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[3f43 02-22 00:15:07.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f44 02-22 00:15:07.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f45 02-22 00:15:07.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f46 02-22 00:15:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4444686153440329491 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[3f47 02-22 00:15:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4444686153440329491 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[3f48 02-22 00:15:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[3f49 02-22 00:15:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f4a 02-22 00:15:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[3f4b 02-22 00:15:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f4c 02-22 00:15:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f4d 02-22 00:15:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f4e 02-22 00:15:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f4f 02-22 00:15:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[3f50 02-22 00:15:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[3f51 02-22 00:15:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f52 02-22 00:15:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f53 02-22 00:15:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f54 02-22 00:15:08.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f55 02-22 00:15:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3f56 02-22 00:15:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f57 02-22 00:15:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3f58 02-22 00:15:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[3f59 02-22 00:15:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 41 41 95 74 ae 12 cf 6d d3 85 66 8e 5e 24 da 59 |AA.t...m..f.^$.Y|
00000010 dd c6 cf 7f 77 41 98 08 a9 f2 91 b0 8c ee ac 40 |....wA.........@|
[3f5a 02-22 00:15:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 be 31 08 7c 1e 8f a7 7d 73 48 |0E.!...1.|...}sH|
00000010 b0 e6 d5 71 f3 6b f8 82 de 07 16 1d d7 ea 85 cf |...q.k..........|
00000020 65 02 4d 64 6e 02 20 5d 92 61 17 af fe a1 29 d2 |e.Mdn. ].a....).|
00000030 78 ce 16 cd c8 b2 18 08 f9 d2 9e ce ec 18 e6 a6 |x...............|
00000040 85 3f d5 f0 c3 cd 79 |.?....y|
[3f5b 02-22 00:15:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[3f5c 02-22 00:15:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 7b ad 27 46 ee 92 23 10 5e 11 78 |0D. M{.'F..#.^.x|
00000010 bc 77 8f c6 1b 14 77 bc 8b 4e d3 ac 5d fb 49 7f |.w....w..N..].I.|
00000020 9d b7 a5 37 02 20 38 ed 04 e6 cc d9 02 be 88 ae |...7. 8.........|
00000030 be 1f 1c 74 23 c2 d6 7c 9c 99 c1 f4 ad 4a 7b a7 |...t#..|.....J{.|
00000040 70 b9 79 d8 1b 21 |p.y..!|
[3f5d 02-22 00:15:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[3f5e 02-22 00:15:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[3f5f 02-22 00:15:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:56
[3f60 02-22 00:15:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:56
[3f61 02-22 00:15:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:55 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[3f62 02-22 00:15:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f63 02-22 00:15:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f64 02-22 00:15:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f65 02-22 00:15:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f66 02-22 00:15:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f67 02-22 00:15:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f68 02-22 00:15:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3f69 02-22 00:15:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f6a 02-22 00:15:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3f6b 02-22 00:15:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[3f6c 02-22 00:15:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f6d 02-22 00:15:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[3f6e 02-22 00:15:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f6f 02-22 00:15:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[3f70 02-22 00:15:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f71 02-22 00:15:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[3f72 02-22 00:15:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f73 02-22 00:15:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[3f74 02-22 00:15:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[3f75 02-22 00:15:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f76 02-22 00:15:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[3f77 02-22 00:15:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f78 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[3f79 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[3f7a 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3f7b 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[3f7c 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[3f7d 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3f7e 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3f7f 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3f80 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3f81 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3f82 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3f83 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3f84 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 89 aa 63 74 04 b5 b2 ad 8a d6 69 de d1 51 ea |s..ct......i..Q.|
00000010 bd d4 0e b5 47 57 ed b6 e7 24 43 ff 2d fb 98 b5 |....GW...$C.-...|
[3f85 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 3b 7b ef ee 04 9c 34 94 52 08 |0E.!..;{....4.R.|
00000010 20 28 ec 16 ba ee 9f 24 3c 0d 9f 86 45 fc 9a 3d | (.....$<...E..=|
00000020 dc f1 09 ac be 02 20 6e 7c 53 86 17 89 e7 ab 09 |...... n|S......|
00000030 32 84 0c 81 c6 92 d2 09 c0 4d 55 0a 05 8f f6 aa |2........MU.....|
00000040 f2 85 af 25 de c7 ee |...%...|
[3f86 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3f87 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ae4e0 gate 1582330509309237800 evaluation starts
[3f88 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ae4e0 signed by 0 principal evaluation starts (used [false])
[3f89 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ae4e0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3f8a 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ae4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3f8b 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ae4e0 principal evaluation fails
[3f8c 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ae4e0 gate 1582330509309237800 evaluation fails
[3f8d 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3f8e 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3f8f 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3f90 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 89 aa 63 74 04 b5 b2 ad 8a d6 69 de d1 51 ea |s..ct......i..Q.|
00000010 bd d4 0e b5 47 57 ed b6 e7 24 43 ff 2d fb 98 b5 |....GW...$C.-...|
[3f91 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 3b 7b ef ee 04 9c 34 94 52 08 |0E.!..;{....4.R.|
00000010 20 28 ec 16 ba ee 9f 24 3c 0d 9f 86 45 fc 9a 3d | (.....$<...E..=|
00000020 dc f1 09 ac be 02 20 6e 7c 53 86 17 89 e7 ab 09 |...... n|S......|
00000030 32 84 0c 81 c6 92 d2 09 c0 4d 55 0a 05 8f f6 aa |2........MU.....|
00000040 f2 85 af 25 de c7 ee |...%...|
[3f92 02-22 00:15:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3f93 02-22 00:15:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aede0 gate 1582330509315055200 evaluation starts
[3f94 02-22 00:15:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aede0 signed by 0 principal evaluation starts (used [false])
[3f95 02-22 00:15:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aede0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[3f96 02-22 00:15:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aede0 principal evaluation succeeds for identity 0
[3f97 02-22 00:15:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aede0 gate 1582330509315055200 evaluation succeeds
[3f98 02-22 00:15:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3f99 02-22 00:15:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3f9a 02-22 00:15:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3f9b 02-22 00:15:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3f9c 02-22 00:15:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[3f9d 02-22 00:15:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes]}
[3f9e 02-22 00:15:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:55
[3f9f 02-22 00:15:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:55
[3fa0 02-22 00:15:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[3fa1 02-22 00:15:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3fa2 02-22 00:15:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3fa3 02-22 00:15:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3fa4 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fa5 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fa6 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fa7 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fa8 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fa9 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3faa 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3fab 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fac 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fad 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[3fae 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[3faf 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[3fb0 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3fb1 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3fb2 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[3fb3 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3fb4 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[3fb5 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3fb6 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[3fb7 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3fb8 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[3fb9 02-22 00:15:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3fba 02-22 00:15:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[3fbb 02-22 00:15:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[3fbc 02-22 00:15:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510121801
[3fbd 02-22 00:15:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 689609D1023A257CB8F80C01E12D87DDA12AAB4AA4D2A0AE8CD576945ED31118
[3fbe 02-22 00:15:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[3fbf 02-22 00:15:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fc0 02-22 00:15:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fc1 02-22 00:15:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fc2 02-22 00:15:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fc3 02-22 00:15:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:18 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[3fc4 02-22 00:15:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fc5 02-22 00:15:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fc6 02-22 00:15:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:18 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[3fc7 02-22 00:15:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3fc8 02-22 00:15:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[3fc9 02-22 00:15:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3fca 02-22 00:15:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[3fcb 02-22 00:15:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[3fcc 02-22 00:15:09.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3fcd 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[3fce 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[3fcf 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[3fd0 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[3fd1 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[3fd2 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[3fd3 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 16 9a d8 9a 09 1c ac 1d 75 bb 3c 38 e2 b6 c8 |.........u.<8...|
00000010 64 09 92 66 08 a2 5f ae 66 7a a4 d4 5d 0c 66 c0 |d..f.._.fz..].f.|
[3fd4 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 6d a5 38 1e c9 87 a4 30 37 d4 a3 |0D. \m.8....07..|
00000010 dd 6a 2c c8 16 33 c4 7c 9b c0 00 f7 7a c5 ef 97 |.j,..3.|....z...|
00000020 3e 65 a8 89 02 20 49 a6 0c 50 90 fa 72 c7 91 90 |>e... I..P..r...|
00000030 a1 f9 ba a6 c1 34 ab 5e 46 8c 10 3e 4a cf 83 d1 |.....4.^F..>J...|
00000040 a4 61 09 22 7e f9 |.a."~.|
[3fd5 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3fd6 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00324e4b0 gate 1582330509370654000 evaluation starts
[3fd7 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00324e4b0 signed by 0 principal evaluation starts (used [false])
[3fd8 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00324e4b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3fd9 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00324e4b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[3fda 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00324e4b0 principal evaluation fails
[3fdb 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00324e4b0 gate 1582330509370654000 evaluation fails
[3fdc 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[3fdd 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[3fde 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[3fdf 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 16 9a d8 9a 09 1c ac 1d 75 bb 3c 38 e2 b6 c8 |.........u.<8...|
00000010 64 09 92 66 08 a2 5f ae 66 7a a4 d4 5d 0c 66 c0 |d..f.._.fz..].f.|
[3fe0 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 6d a5 38 1e c9 87 a4 30 37 d4 a3 |0D. \m.8....07..|
00000010 dd 6a 2c c8 16 33 c4 7c 9b c0 00 f7 7a c5 ef 97 |.j,..3.|....z...|
00000020 3e 65 a8 89 02 20 49 a6 0c 50 90 fa 72 c7 91 90 |>e... I..P..r...|
00000030 a1 f9 ba a6 c1 34 ab 5e 46 8c 10 3e 4a cf 83 d1 |.....4.^F..>J...|
00000040 a4 61 09 22 7e f9 |.a."~.|
[3fe1 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[3fe2 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00324edb0 gate 1582330509371850100 evaluation starts
[3fe3 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00324edb0 signed by 0 principal evaluation starts (used [false])
[3fe4 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00324edb0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[3fe5 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00324edb0 principal evaluation succeeds for identity 0
[3fe6 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00324edb0 gate 1582330509371850100 evaluation succeeds
[3fe7 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[3fe8 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[3fe9 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[3fea 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[3feb 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[3fec 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes]}
[3fed 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:53
[3fee 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:53
[3fef 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[3ff0 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ff1 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ff2 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3ff3 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ff4 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ff5 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ff6 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ff7 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ff8 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ff9 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3ffa 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ffb 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[3ffc 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[3ffd 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[3ffe 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[3fff 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[4000 02-22 00:15:09.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4001 02-22 00:15:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[4002 02-22 00:15:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4003 02-22 00:15:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[4004 02-22 00:15:09.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4005 02-22 00:15:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[4006 02-22 00:15:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[4007 02-22 00:15:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4008 02-22 00:15:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes
[4009 02-22 00:15:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[400a 02-22 00:15:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151034
[400b 02-22 00:15:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FCF84940ACADDAB7848E8367D1B600EDE9E333F071FD8966553368C85F408AD2
[400c 02-22 00:15:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[400d 02-22 00:15:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[400e 02-22 00:15:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[400f 02-22 00:15:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4010 02-22 00:15:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4011 02-22 00:15:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4012 02-22 00:15:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4013 02-22 00:15:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes
[4015 02-22 00:15:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4014 02-22 00:15:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4016 02-22 00:15:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4017 02-22 00:15:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[4018 02-22 00:15:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4019 02-22 00:15:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[401a 02-22 00:15:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes
[401b 02-22 00:15:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[401c 02-22 00:15:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:13439442218999169394 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[401d 02-22 00:15:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13439442218999169394 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[401e 02-22 00:15:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[401f 02-22 00:15:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4020 02-22 00:15:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4021 02-22 00:15:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4022 02-22 00:15:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4023 02-22 00:15:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4024 02-22 00:15:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[4025 02-22 00:15:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4026 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[4027 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4028 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[4029 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[402a 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c 0f 99 7b 21 3a 12 ed d8 f7 6b 4d 2a ec 26 62 ||..{!:....kM*.&b|
00000010 bf 25 bb 9c bc 34 d8 67 28 6b 61 b4 5e a6 16 5f |.%...4.g(ka.^.._|
[402b 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 80 a6 c4 ba 6c a9 29 9d 04 88 45 |0D. t....l.)...E|
00000010 71 7c a9 03 04 38 c6 c5 da 49 96 52 bf a0 e0 4c |q|...8...I.R...L|
00000020 30 92 46 5b 02 20 6b 22 ea fd 9d 47 e0 66 ff 06 |0.F[. k"...G.f..|
00000030 21 d6 08 a8 37 dd b9 e5 e8 93 88 86 41 fe 08 e7 |!...7.......A...|
00000040 9e b9 d5 db d6 12 |......|
[402c 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[402d 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 64 7c b2 3e ba fc 37 d5 90 71 5f |0D. pd|.>..7..q_|
00000010 f4 1f ef 22 f5 35 84 fc b4 50 c8 4f 1a ba 09 57 |...".5...P.O...W|
00000020 71 49 f2 6b 02 20 74 e3 ac d2 4a c1 a7 af b3 a7 |qI.k. t...J.....|
00000030 ba 8b 33 53 3c a5 fe 1b 2b 7e 45 b3 f7 07 51 90 |..3S<...+~E...Q.|
00000040 43 91 59 ef 69 cc |C.Y.i.|
[402e 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[402f 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[4030 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:57
[4031 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:57
[4032 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[4033 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4034 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4035 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4036 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[4037 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4038 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4039 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[403a 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[403b 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[403c 02-22 00:15:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[403d 02-22 00:15:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:8581330188456615569 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[403e 02-22 00:15:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:8581330188456615569 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[403f 02-22 00:15:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[4040 02-22 00:15:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4041 02-22 00:15:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:37164411953031946 msg_type:IDENTITY_MSG > , Envelope: 15 bytes, Signature: 0 bytes
[4042 02-22 00:15:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:37164411953031946 msg_type:IDENTITY_MSG > , Envelope: 15 bytes, Signature: 0 bytes
[4043 02-22 00:15:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:37164411953031946 msg_type:IDENTITY_MSG > , Envelope: 15 bytes, Signature: 0 bytes
[4044 02-22 00:15:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4045 02-22 00:15:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4046 02-22 00:15:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4047 02-22 00:15:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4048 02-22 00:15:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4049 02-22 00:15:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[404a 02-22 00:15:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[404b 02-22 00:15:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[404c 02-22 00:15:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[404d 02-22 00:15:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:127887147979559533 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[404e 02-22 00:15:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:127887147979559533 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[404f 02-22 00:15:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4050 02-22 00:15:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[4051 02-22 00:15:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17209819231164656172 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[4052 02-22 00:15:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[4053 02-22 00:15:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 127887147979559533 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[4054 02-22 00:15:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 127887147979559533 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[4055 02-22 00:15:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17442770924583941242 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[4056 02-22 00:15:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17209819231164656172 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4057 02-22 00:15:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4058 02-22 00:15:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17442770924583941242 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4059 02-22 00:15:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[405a 02-22 00:15:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17442770924583941242 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[405b 02-22 00:15:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[405c 02-22 00:15:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17442770924583941242 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[405d 02-22 00:15:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17442770924583941242 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[405e 02-22 00:15:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[405f 02-22 00:15:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17209819231164656172 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[4060 02-22 00:15:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17209819231164656172 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[4061 02-22 00:15:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4062 02-22 00:15:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4063 02-22 00:15:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4064 02-22 00:15:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4065 02-22 00:15:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4066 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[4067 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4068 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4069 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[406a 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[406b 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[406c 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[406d 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[406e 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 9e 86 a3 a9 87 55 9d 3e 68 97 dd d8 f6 39 89 |\.....U.>h....9.|
00000010 35 2a 07 b0 18 bc a8 be 5e 7e d4 47 9f 8a 2a a4 |5*......^~.G..*.|
[406f 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 34 0b 29 a4 ee 57 d2 68 98 1f dc |0D. $4.)..W.h...|
00000010 c8 c7 ea 56 77 5c bb d2 a6 e3 e3 be a6 0b 97 f0 |...Vw\..........|
00000020 9d 3e 0f 22 02 20 29 70 fe 60 7f 5c f0 46 bc c3 |.>.". )p.`.\.F..|
00000030 1f dd 34 58 91 81 0e 99 5c 2a 29 95 a9 c1 13 f6 |..4X....\*).....|
00000040 17 42 5d 13 3f 23 |.B].?#|
[4070 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4071 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003310a60 gate 1582330510471598200 evaluation starts
[4072 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003310a60 signed by 0 principal evaluation starts (used [false])
[4073 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003310a60 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4074 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003310a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4075 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003310a60 principal evaluation fails
[4076 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003310a60 gate 1582330510471598200 evaluation fails
[4077 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4078 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4079 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[407a 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 9e 86 a3 a9 87 55 9d 3e 68 97 dd d8 f6 39 89 |\.....U.>h....9.|
00000010 35 2a 07 b0 18 bc a8 be 5e 7e d4 47 9f 8a 2a a4 |5*......^~.G..*.|
[407b 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 34 0b 29 a4 ee 57 d2 68 98 1f dc |0D. $4.)..W.h...|
00000010 c8 c7 ea 56 77 5c bb d2 a6 e3 e3 be a6 0b 97 f0 |...Vw\..........|
00000020 9d 3e 0f 22 02 20 29 70 fe 60 7f 5c f0 46 bc c3 |.>.". )p.`.\.F..|
00000030 1f dd 34 58 91 81 0e 99 5c 2a 29 95 a9 c1 13 f6 |..4X....\*).....|
00000040 17 42 5d 13 3f 23 |.B].?#|
[407c 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[407d 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003311360 gate 1582330510472189600 evaluation starts
[407e 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003311360 signed by 0 principal evaluation starts (used [false])
[407f 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003311360 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4080 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003311360 principal evaluation succeeds for identity 0
[4081 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003311360 gate 1582330510472189600 evaluation succeeds
[4082 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4083 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4084 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4085 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4086 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes
[4087 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes]}
[4088 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:56
[4089 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:56
[408a 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[408b 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[408c 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[408d 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[408e 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[408f 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4090 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4091 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4092 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[4093 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[4094 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[4095 02-22 00:15:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4096 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4097 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4098 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4099 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[409a 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[409b 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[409c 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[409d 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[409e 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[409f 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[40a0 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[40a1 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 d7 26 d8 49 51 5a c2 c7 4c 54 26 7c 5c 29 c4 |7.&.IQZ..LT&|\).|
00000010 95 44 5d 7e e2 1f af d2 6b b2 b0 c5 bd 16 11 c5 |.D]~....k.......|
[40a2 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 77 9a 9e 02 4d 7b 62 d2 ef 7a |0E.!..w...M{b..z|
00000010 21 28 3c 0d 24 eb 83 55 07 15 55 c1 0e 9c 3f 75 |!(<.$..U..U...?u|
00000020 5a f1 68 fb d2 02 20 65 db 51 e8 e8 b3 0f 1d fe |Z.h... e.Q......|
00000030 5e c1 d9 d1 d8 02 33 d8 8c be 8c 1f d0 8d 21 c4 |^.....3.......!.|
00000040 a0 b4 45 44 b8 27 15 |..ED.'.|
[40a3 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[40a4 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e0f0 gate 1582330510493327500 evaluation starts
[40a5 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e0f0 signed by 0 principal evaluation starts (used [false])
[40a6 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e0f0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[40a7 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e0f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[40a8 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e0f0 principal evaluation fails
[40a9 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e0f0 gate 1582330510493327500 evaluation fails
[40aa 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[40ab 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[40ac 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[40ad 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 d7 26 d8 49 51 5a c2 c7 4c 54 26 7c 5c 29 c4 |7.&.IQZ..LT&|\).|
00000010 95 44 5d 7e e2 1f af d2 6b b2 b0 c5 bd 16 11 c5 |.D]~....k.......|
[40ae 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 77 9a 9e 02 4d 7b 62 d2 ef 7a |0E.!..w...M{b..z|
00000010 21 28 3c 0d 24 eb 83 55 07 15 55 c1 0e 9c 3f 75 |!(<.$..U..U...?u|
00000020 5a f1 68 fb d2 02 20 65 db 51 e8 e8 b3 0f 1d fe |Z.h... e.Q......|
00000030 5e c1 d9 d1 d8 02 33 d8 8c be 8c 1f d0 8d 21 c4 |^.....3.......!.|
00000040 a0 b4 45 44 b8 27 15 |..ED.'.|
[40af 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[40b0 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e9f0 gate 1582330510494257100 evaluation starts
[40b1 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e9f0 signed by 0 principal evaluation starts (used [false])
[40b2 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e9f0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[40b3 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e9f0 principal evaluation succeeds for identity 0
[40b4 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e9f0 gate 1582330510494257100 evaluation succeeds
[40b5 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[40b6 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[40b7 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[40b8 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[40b9 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes
[40ba 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes]}
[40bb 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:54
[40bc 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:54
[40bd 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:53 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[40be 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[40bf 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[40c0 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[40c1 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[40c2 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[40c3 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[40c4 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[40c5 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[40c6 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[40c7 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[40c8 02-22 00:15:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[40c9 02-22 00:15:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151035
[40ca 02-22 00:15:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 74DF537006F95607AEF81B9C0E71A6C3FC8ABE77ADC30FE64908863CCC6586E4
[40cb 02-22 00:15:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[40cc 02-22 00:15:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[40cd 02-22 00:15:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[40ce 02-22 00:15:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[40cf 02-22 00:15:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[40d0 02-22 00:15:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[40d1 02-22 00:15:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[40d2 02-22 00:15:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[40d3 02-22 00:15:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[40d4 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[40d7 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[40d5 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[40d8 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[40d9 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[40da 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[40db 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[40dc 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 df 53 70 06 f9 56 07 ae f8 1b 9c 0e 71 a6 c3 |t.Sp..V......q..|
00000010 fc 8a be 77 ad c3 0f e6 49 08 86 3c cc 65 86 e4 |...w....I..<.e..|
[40dd 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 82 34 c0 f8 f2 00 37 22 c6 89 |0E.!...4....7"..|
00000010 00 77 88 61 c1 bc 79 b3 d5 dd 67 12 8e ec 07 28 |.w.a..y...g....(|
00000020 f0 cc 25 6c d5 02 20 5a a6 bc 89 da 33 69 39 47 |..%l.. Z....3i9G|
00000030 8b af 01 5f 28 f9 1a 04 3a a3 81 44 91 99 c9 8a |..._(...:..D....|
00000040 9d bf a3 eb 04 ad ab |.......|
[40d6 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[40de 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[40e0 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[40e1 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[40e2 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[40e3 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c 0f 99 7b 21 3a 12 ed d8 f7 6b 4d 2a ec 26 62 ||..{!:....kM*.&b|
00000010 bf 25 bb 9c bc 34 d8 67 28 6b 61 b4 5e a6 16 5f |.%...4.g(ka.^.._|
[40e4 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 80 a6 c4 ba 6c a9 29 9d 04 88 45 |0D. t....l.)...E|
00000010 71 7c a9 03 04 38 c6 c5 da 49 96 52 bf a0 e0 4c |q|...8...I.R...L|
00000020 30 92 46 5b 02 20 6b 22 ea fd 9d 47 e0 66 ff 06 |0.F[. k"...G.f..|
00000030 21 d6 08 a8 37 dd b9 e5 e8 93 88 86 41 fe 08 e7 |!...7.......A...|
00000040 9e b9 d5 db d6 12 |......|
[40e5 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes
[40e6 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[40e7 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[40e8 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[40e9 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[40ea 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[40eb 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[40ec 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[40ed 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[40ee 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[40ef 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 d7 26 d8 49 51 5a c2 c7 4c 54 26 7c 5c 29 c4 |7.&.IQZ..LT&|\).|
00000010 95 44 5d 7e e2 1f af d2 6b b2 b0 c5 bd 16 11 c5 |.D]~....k.......|
[40f0 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 77 9a 9e 02 4d 7b 62 d2 ef 7a |0E.!..w...M{b..z|
00000010 21 28 3c 0d 24 eb 83 55 07 15 55 c1 0e 9c 3f 75 |!(<.$..U..U...?u|
00000020 5a f1 68 fb d2 02 20 65 db 51 e8 e8 b3 0f 1d fe |Z.h... e.Q......|
00000030 5e c1 d9 d1 d8 02 33 d8 8c be 8c 1f d0 8d 21 c4 |^.....3.......!.|
00000040 a0 b4 45 44 b8 27 15 |..ED.'.|
[40f1 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[40f2 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003395190 gate 1582330510570097700 evaluation starts
[40f3 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003395190 signed by 0 principal evaluation starts (used [false])
[40f4 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003395190 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[40f5 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003395190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[40f6 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003395190 principal evaluation fails
[40f7 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003395190 gate 1582330510570097700 evaluation fails
[40f8 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[40f9 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[40fa 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[40fb 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 d7 26 d8 49 51 5a c2 c7 4c 54 26 7c 5c 29 c4 |7.&.IQZ..LT&|\).|
00000010 95 44 5d 7e e2 1f af d2 6b b2 b0 c5 bd 16 11 c5 |.D]~....k.......|
[40fc 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 77 9a 9e 02 4d 7b 62 d2 ef 7a |0E.!..w...M{b..z|
00000010 21 28 3c 0d 24 eb 83 55 07 15 55 c1 0e 9c 3f 75 |!(<.$..U..U...?u|
00000020 5a f1 68 fb d2 02 20 65 db 51 e8 e8 b3 0f 1d fe |Z.h... e.Q......|
00000030 5e c1 d9 d1 d8 02 33 d8 8c be 8c 1f d0 8d 21 c4 |^.....3.......!.|
00000040 a0 b4 45 44 b8 27 15 |..ED.'.|
[40fd 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[40fe 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003395a90 gate 1582330510571407900 evaluation starts
[40ff 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003395a90 signed by 0 principal evaluation starts (used [false])
[4100 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003395a90 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4101 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003395a90 principal evaluation succeeds for identity 0
[4102 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003395a90 gate 1582330510571407900 evaluation succeeds
[4103 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4104 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4105 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4106 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4107 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes
[4108 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4109 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[40df 02-22 00:15:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[410a 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[410b 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[410c 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[410d 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[410e 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 df 53 70 06 f9 56 07 ae f8 1b 9c 0e 71 a6 c3 |t.Sp..V......q..|
00000010 fc 8a be 77 ad c3 0f e6 49 08 86 3c cc 65 86 e4 |...w....I..<.e..|
[410f 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 82 34 c0 f8 f2 00 37 22 c6 89 |0E.!...4....7"..|
00000010 00 77 88 61 c1 bc 79 b3 d5 dd 67 12 8e ec 07 28 |.w.a..y...g....(|
00000020 f0 cc 25 6c d5 02 20 5a a6 bc 89 da 33 69 39 47 |..%l.. Z....3i9G|
00000030 8b af 01 5f 28 f9 1a 04 3a a3 81 44 91 99 c9 8a |..._(...:..D....|
00000040 9d bf a3 eb 04 ad ab |.......|
[4110 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[4111 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 65 53 3e f0 a1 00 c4 75 ee bd 5a |0D. {eS>....u..Z|
00000010 5e 50 08 da b0 b3 0f 36 26 5f 57 27 cb 32 12 20 |^P.....6&_W'.2. |
00000020 d1 49 60 4e 02 20 57 99 c6 53 cb 6d 38 09 31 e0 |.I`N. W..S.m8.1.|
00000030 78 5a d7 5e a1 3f 14 0b b8 3e 1e 0e 32 48 61 c6 |xZ.^.?...>..2Ha.|
00000040 19 d3 76 02 a2 cc |..v...|
[4112 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4113 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4114 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4115 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4116 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[4117 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4118 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[4119 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[411a 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 df 53 70 06 f9 56 07 ae f8 1b 9c 0e 71 a6 c3 |t.Sp..V......q..|
00000010 fc 8a be 77 ad c3 0f e6 49 08 86 3c cc 65 86 e4 |...w....I..<.e..|
[411b 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 82 34 c0 f8 f2 00 37 22 c6 89 |0E.!...4....7"..|
00000010 00 77 88 61 c1 bc 79 b3 d5 dd 67 12 8e ec 07 28 |.w.a..y...g....(|
00000020 f0 cc 25 6c d5 02 20 5a a6 bc 89 da 33 69 39 47 |..%l.. Z....3i9G|
00000030 8b af 01 5f 28 f9 1a 04 3a a3 81 44 91 99 c9 8a |..._(...:..D....|
00000040 9d bf a3 eb 04 ad ab |.......|
[411c 02-22 00:15:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[411d 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes
[411e 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[411f 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[4120 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c 0f 99 7b 21 3a 12 ed d8 f7 6b 4d 2a ec 26 62 ||..{!:....kM*.&b|
00000010 bf 25 bb 9c bc 34 d8 67 28 6b 61 b4 5e a6 16 5f |.%...4.g(ka.^.._|
[4121 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 80 a6 c4 ba 6c a9 29 9d 04 88 45 |0D. t....l.)...E|
00000010 71 7c a9 03 04 38 c6 c5 da 49 96 52 bf a0 e0 4c |q|...8...I.R...L|
00000020 30 92 46 5b 02 20 6b 22 ea fd 9d 47 e0 66 ff 06 |0.F[. k"...G.f..|
00000030 21 d6 08 a8 37 dd b9 e5 e8 93 88 86 41 fe 08 e7 |!...7.......A...|
00000040 9e b9 d5 db d6 12 |......|
[4122 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes
[4123 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4124 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[4125 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4126 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4127 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4128 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4129 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[412a 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[412b 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[412c 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 9e 86 a3 a9 87 55 9d 3e 68 97 dd d8 f6 39 89 |\.....U.>h....9.|
00000010 35 2a 07 b0 18 bc a8 be 5e 7e d4 47 9f 8a 2a a4 |5*......^~.G..*.|
[412d 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 34 0b 29 a4 ee 57 d2 68 98 1f dc |0D. $4.)..W.h...|
00000010 c8 c7 ea 56 77 5c bb d2 a6 e3 e3 be a6 0b 97 f0 |...Vw\..........|
00000020 9d 3e 0f 22 02 20 29 70 fe 60 7f 5c f0 46 bc c3 |.>.". )p.`.\.F..|
00000030 1f dd 34 58 91 81 0e 99 5c 2a 29 95 a9 c1 13 f6 |..4X....\*).....|
00000040 17 42 5d 13 3f 23 |.B].?#|
[412e 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[412f 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1ae0 gate 1582330510583934300 evaluation starts
[4130 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1ae0 signed by 0 principal evaluation starts (used [false])
[4131 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1ae0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4132 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4133 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1ae0 principal evaluation fails
[4134 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1ae0 gate 1582330510583934300 evaluation fails
[4135 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4136 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4137 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4138 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 9e 86 a3 a9 87 55 9d 3e 68 97 dd d8 f6 39 89 |\.....U.>h....9.|
00000010 35 2a 07 b0 18 bc a8 be 5e 7e d4 47 9f 8a 2a a4 |5*......^~.G..*.|
[4139 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 34 0b 29 a4 ee 57 d2 68 98 1f dc |0D. $4.)..W.h...|
00000010 c8 c7 ea 56 77 5c bb d2 a6 e3 e3 be a6 0b 97 f0 |...Vw\..........|
00000020 9d 3e 0f 22 02 20 29 70 fe 60 7f 5c f0 46 bc c3 |.>.". )p.`.\.F..|
00000030 1f dd 34 58 91 81 0e 99 5c 2a 29 95 a9 c1 13 f6 |..4X....\*).....|
00000040 17 42 5d 13 3f 23 |.B].?#|
[413a 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[413b 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d63e0 gate 1582330510584561200 evaluation starts
[413c 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d63e0 signed by 0 principal evaluation starts (used [false])
[413d 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d63e0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[413e 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d63e0 principal evaluation succeeds for identity 0
[413f 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d63e0 gate 1582330510584561200 evaluation succeeds
[4140 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4141 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4142 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4143 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4144 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes
[4145 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4146 02-22 00:15:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4147 02-22 00:15:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4148 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4149 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[414a 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[414b 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[414d 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[414e 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[414c 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[414f 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4150 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4151 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4152 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4153 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4154 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4155 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4156 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4157 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4158 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4159 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[415a 02-22 00:15:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[415b 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[415c 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[415d 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[415e 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ed810 gate 1582330511050519300 evaluation starts
[415f 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ed810 signed by 0 principal evaluation starts (used [false])
[4160 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ed810 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4161 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ed810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4162 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ed810 principal evaluation fails
[4163 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ed810 gate 1582330511050519300 evaluation fails
[4164 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4165 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4166 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4167 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4168 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4169 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[416a 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003416110 gate 1582330511051267700 evaluation starts
[416b 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003416110 signed by 0 principal evaluation starts (used [false])
[416c 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003416110 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[416d 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003416110 principal evaluation succeeds for identity 0
[416e 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003416110 gate 1582330511051267700 evaluation succeeds
[416f 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4170 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4171 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4172 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4173 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[4174 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[4175 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4176 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4177 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4178 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4179 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[417a 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[417b 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[417c 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[417d 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[417e 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[417f 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4180 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343a220 gate 1582330511055429700 evaluation starts
[4181 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343a220 signed by 0 principal evaluation starts (used [false])
[4182 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343a220 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4183 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343a220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4184 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343a220 principal evaluation fails
[4185 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343a220 gate 1582330511055429700 evaluation fails
[4186 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4187 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4188 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4189 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[418a 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[418b 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[418c 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343ab20 gate 1582330511058812100 evaluation starts
[418d 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343ab20 signed by 0 principal evaluation starts (used [false])
[418e 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343ab20 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[418f 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343ab20 principal evaluation succeeds for identity 0
[4190 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343ab20 gate 1582330511058812100 evaluation succeeds
[4191 02-22 00:15:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4192 02-22 00:15:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4193 02-22 00:15:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4194 02-22 00:15:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4195 02-22 00:15:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[4196 02-22 00:15:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[4197 02-22 00:15:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4198 02-22 00:15:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4199 02-22 00:15:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[419a 02-22 00:15:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[419b 02-22 00:15:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[419c 02-22 00:15:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[419d 02-22 00:15:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[419e 02-22 00:15:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[419f 02-22 00:15:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[41a0 02-22 00:15:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[41a1 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[41a2 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[41a3 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[41a4 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[41a5 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003462ee0 gate 1582330511072439800 evaluation starts
[41a6 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003462ee0 signed by 0 principal evaluation starts (used [false])
[41a7 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003462ee0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[41a8 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003462ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[41a9 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003462ee0 principal evaluation fails
[41aa 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003462ee0 gate 1582330511072439800 evaluation fails
[41ab 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[41ac 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[41ad 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[41ae 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[41af 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[41b0 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[41b1 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034637e0 gate 1582330511075429400 evaluation starts
[41b2 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034637e0 signed by 0 principal evaluation starts (used [false])
[41b3 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034637e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[41b4 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034637e0 principal evaluation succeeds for identity 0
[41b5 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034637e0 gate 1582330511075429400 evaluation succeeds
[41b6 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[41b7 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[41b8 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[41b9 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[41ba 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[41bb 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[41bc 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[41bd 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[41be 02-22 00:15:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[41bf 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[41c0 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[41c1 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[41c2 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[41c3 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[41c4 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[41c5 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[41c6 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[41c7 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[41c8 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[41c9 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346ffa0 gate 1582330511084180600 evaluation starts
[41ca 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346ffa0 signed by 0 principal evaluation starts (used [false])
[41cb 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346ffa0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[41cc 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346ffa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[41cd 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346ffa0 principal evaluation fails
[41ce 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346ffa0 gate 1582330511084180600 evaluation fails
[41cf 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[41d0 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[41d1 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[41d2 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[41d3 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[41d4 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[41d5 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034868a0 gate 1582330511088579200 evaluation starts
[41d6 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034868a0 signed by 0 principal evaluation starts (used [false])
[41d7 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034868a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[41d8 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034868a0 principal evaluation succeeds for identity 0
[41d9 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034868a0 gate 1582330511088579200 evaluation succeeds
[41da 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[41db 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[41dc 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[41dd 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[41de 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[41df 02-22 00:15:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[41e0 02-22 00:15:11.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[41e1 02-22 00:15:11.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[41e2 02-22 00:15:11.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[41e3 02-22 00:15:11.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[41e4 02-22 00:15:11.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[41e5 02-22 00:15:11.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[41e6 02-22 00:15:11.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[41e7 02-22 00:15:11.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[41e8 02-22 00:15:11.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[41e9 02-22 00:15:11.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[41ea 02-22 00:15:11.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[41eb 02-22 00:15:11.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[41ec 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[41ed 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[41ee 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[41ef 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349f240 gate 1582330511101526700 evaluation starts
[41f0 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349f240 signed by 0 principal evaluation starts (used [false])
[41f1 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349f240 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[41f2 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349f240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[41f3 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349f240 principal evaluation fails
[41f4 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349f240 gate 1582330511101526700 evaluation fails
[41f5 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[41f6 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[41f7 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[41f8 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[41f9 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[41fa 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[41fb 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d7550 gate 1582330511107114500 evaluation starts
[41fc 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d7550 signed by 0 principal evaluation starts (used [false])
[41fd 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d7550 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[41fe 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d7550 principal evaluation succeeds for identity 0
[41ff 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d7550 gate 1582330511107114500 evaluation succeeds
[4200 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4201 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4202 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4203 02-22 00:15:11.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4204 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4205 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4206 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4207 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4208 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4209 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[420a 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[420b 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[420c 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[420d 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[420e 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[420f 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4fb0 gate 1582330511117373600 evaluation starts
[4210 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4fb0 signed by 0 principal evaluation starts (used [false])
[4211 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4fb0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4212 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4213 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4fb0 principal evaluation fails
[4214 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4fb0 gate 1582330511117373600 evaluation fails
[4215 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4216 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4217 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4218 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4219 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[421a 02-22 00:15:11.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[421b 02-22 00:15:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b58b0 gate 1582330511120335300 evaluation starts
[421c 02-22 00:15:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b58b0 signed by 0 principal evaluation starts (used [false])
[421d 02-22 00:15:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b58b0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[421e 02-22 00:15:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b58b0 principal evaluation succeeds for identity 0
[421f 02-22 00:15:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b58b0 gate 1582330511120335300 evaluation succeeds
[4220 02-22 00:15:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4221 02-22 00:15:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4222 02-22 00:15:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4223 02-22 00:15:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4224 02-22 00:15:11.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4225 02-22 00:15:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4226 02-22 00:15:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4227 02-22 00:15:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[4228 02-22 00:15:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4229 02-22 00:15:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[422a 02-22 00:15:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9020773210884897755 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[422b 02-22 00:15:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9020773210884897755 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[422c 02-22 00:15:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[422d 02-22 00:15:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9020773210884897755 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[422e 02-22 00:15:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9020773210884897755 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[422f 02-22 00:15:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4230 02-22 00:15:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[4231 02-22 00:15:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4232 02-22 00:15:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4233 02-22 00:15:11.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4234 02-22 00:15:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:10887868114306855180 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[4235 02-22 00:15:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:10887868114306855180 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[4236 02-22 00:15:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[4237 02-22 00:15:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4238 02-22 00:15:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[4239 02-22 00:15:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[423a 02-22 00:15:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[423b 02-22 00:15:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[423c 02-22 00:15:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[423d 02-22 00:15:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[423e 02-22 00:15:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[423f 02-22 00:15:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4240 02-22 00:15:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4241 02-22 00:15:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4242 02-22 00:15:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4243 02-22 00:15:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s
[4244 02-22 00:15:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:10881723236941792770 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4245 02-22 00:15:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10881723236941792770 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4246 02-22 00:15:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4247 02-22 00:15:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4248 02-22 00:15:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4249 02-22 00:15:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[424a 02-22 00:15:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[424b 02-22 00:15:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[424c 02-22 00:15:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[424d 02-22 00:15:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[424e 02-22 00:15:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[424f 02-22 00:15:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4250 02-22 00:15:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4251 02-22 00:15:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[4252 02-22 00:15:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 a3 3b 83 f6 eb f4 97 99 d0 85 07 52 cb bb 26 |..;.........R..&|
00000010 9f d0 be 80 db 0e 3a b9 d2 fb 55 da d1 55 32 61 |......:...U..U2a|
[4253 02-22 00:15:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb ac a3 d8 06 af 58 2c 6e 1e c7 |0E.!.......X,n..|
00000010 c7 6a c5 65 8c 54 83 bd 53 bd 4d 97 0a 5e 85 dd |.j.e.T..S.M..^..|
00000020 56 e9 f1 6e 97 02 20 48 61 5d d8 9f 3e ca ef 2c |V..n.. Ha]..>..,|
00000030 55 fd 17 e5 69 91 e3 c4 f4 23 72 02 af 28 9a c6 |U...i....#r..(..|
00000040 7c f4 86 65 48 63 63 ||..eHcc|
[4254 02-22 00:15:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[4255 02-22 00:15:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 18 21 2a 39 28 f5 ef 37 85 b1 |0E.!...!*9(..7..|
00000010 db 16 38 77 37 a6 c6 a3 98 b0 ef 0e 44 a9 96 41 |..8w7.......D..A|
00000020 5c 6a 79 5d 09 02 20 33 23 6b 30 5f f2 d9 7c a2 |\jy].. 3#k0_..|.|
00000030 6e 14 95 33 91 03 71 3a 82 a9 8c 65 cb 15 de 1a |n..3..q:...e....|
00000040 00 13 98 df c5 67 31 |.....g1|
[4256 02-22 00:15:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4257 02-22 00:15:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[4258 02-22 00:15:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:58
[4259 02-22 00:15:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:58
[425a 02-22 00:15:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[425b 02-22 00:15:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[425c 02-22 00:15:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[425d 02-22 00:15:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[425e 02-22 00:15:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[425f 02-22 00:15:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4260 02-22 00:15:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4261 02-22 00:15:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4262 02-22 00:15:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4263 02-22 00:15:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4264 02-22 00:15:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[4265 02-22 00:15:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4266 02-22 00:15:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[4267 02-22 00:15:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4268 02-22 00:15:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[4269 02-22 00:15:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[426a 02-22 00:15:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[426b 02-22 00:15:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[426c 02-22 00:15:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[426d 02-22 00:15:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[426e 02-22 00:15:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[426f 02-22 00:15:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[4270 02-22 00:15:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4271 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[4272 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4273 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[4274 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[4275 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 60 58 02 de 37 2a 77 51 95 29 b3 3c 4d f1 6e |.`X..7*wQ.).<M.n|
00000010 b8 aa b1 ad 72 d4 93 6d 10 d1 f1 3f f2 e3 bd 9a |....r..m...?....|
[4276 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 d0 44 c6 e3 b8 a4 71 f0 8e 1b |0E.!...D....q...|
00000010 9f 8f bc 2a 58 b7 5f aa 15 61 bf e2 ec 97 7f 0c |...*X._..a......|
00000020 d2 c6 56 ad 0f 02 20 7f 12 25 30 d4 d7 4c 94 f0 |..V... ..%0..L..|
00000030 53 41 58 2a 13 a5 a6 30 38 0e 6f 28 5c 98 51 c1 |SAX*...08.o(\.Q.|
00000040 a0 6f a7 bc bf d5 73 |.o....s|
[4277 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[4278 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 3a 14 c9 b6 0a 04 b9 e6 b2 ee cd |0D. Y:..........|
00000010 85 4b 4e b7 db a9 34 2b 1b 35 61 31 7c 4a b7 25 |.KN...4+.5a1|J.%|
00000020 9f 92 dc 92 02 20 7b e5 25 68 ee b4 52 d1 13 b1 |..... {.%h..R...|
00000030 cb 37 b6 ff 84 db 6a e0 b7 f5 a5 c9 7e fe 88 95 |.7....j.....~...|
00000040 b3 70 db 74 c9 f4 |.p.t..|
[4279 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[427a 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[427b 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:59
[427c 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:59
[427d 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[427e 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[427f 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4280 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4281 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[4282 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4283 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4284 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[4285 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[4286 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[4287 02-22 00:15:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4288 02-22 00:15:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes
[4289 02-22 00:15:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes
[428a 02-22 00:15:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[428b 02-22 00:15:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes
[428c 02-22 00:15:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[428d 02-22 00:15:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[428e 02-22 00:15:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[428f 02-22 00:15:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4290 02-22 00:15:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4291 02-22 00:15:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4292 02-22 00:15:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4293 02-22 00:15:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4294 02-22 00:15:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a b7 44 ea 18 74 ea f9 7b 96 d9 95 a9 ea 78 79 |j.D..t..{.....xy|
00000010 d4 de db f6 ce 19 58 ea d7 95 85 f9 d4 83 66 f6 |......X.......f.|
[4295 02-22 00:15:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e cb 05 81 74 f8 10 97 41 02 e5 c8 |0D. ....t...A...|
00000010 ca 33 17 5b fb 12 50 6d d2 bc f3 bd 90 8e ae c0 |.3.[..Pm........|
00000020 5f 3b a3 09 02 20 7d b8 27 83 b4 35 c0 2f 81 c7 |_;... }.'..5./..|
00000030 8f 85 5a ae 89 fc 82 86 46 7c 88 c0 47 d6 74 5d |..Z.....F|..G.t]|
00000040 a7 5d a3 12 0d 22 |.]..."|
[4296 02-22 00:15:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4297 02-22 00:15:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355f4a0 gate 1582330514319703700 evaluation starts
[4298 02-22 00:15:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355f4a0 signed by 0 principal evaluation starts (used [false])
[4299 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355f4a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[429a 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355f4a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[429b 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355f4a0 principal evaluation fails
[429c 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355f4a0 gate 1582330514319703700 evaluation fails
[429d 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[429e 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[429f 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[42a0 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a b7 44 ea 18 74 ea f9 7b 96 d9 95 a9 ea 78 79 |j.D..t..{.....xy|
00000010 d4 de db f6 ce 19 58 ea d7 95 85 f9 d4 83 66 f6 |......X.......f.|
[42a1 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e cb 05 81 74 f8 10 97 41 02 e5 c8 |0D. ....t...A...|
00000010 ca 33 17 5b fb 12 50 6d d2 bc f3 bd 90 8e ae c0 |.3.[..Pm........|
00000020 5f 3b a3 09 02 20 7d b8 27 83 b4 35 c0 2f 81 c7 |_;... }.'..5./..|
00000030 8f 85 5a ae 89 fc 82 86 46 7c 88 c0 47 d6 74 5d |..Z.....F|..G.t]|
00000040 a7 5d a3 12 0d 22 |.]..."|
[42a2 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[42a3 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355fda0 gate 1582330514321702700 evaluation starts
[42a4 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355fda0 signed by 0 principal evaluation starts (used [false])
[42a5 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355fda0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[42a6 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355fda0 principal evaluation succeeds for identity 0
[42a7 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355fda0 gate 1582330514321702700 evaluation succeeds
[42a8 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[42a9 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[42aa 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[42ab 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[42ac 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes
[42ad 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes]}
[42ae 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:57
[42af 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:57
[42b0 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[42b1 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42b2 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42b3 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42b4 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:15716175635112812985 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[42b5 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:15716175635112812985 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[42b6 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[42b7 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42b8 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42b9 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42ba 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42bb 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42bc 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42bd 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42be 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42bf 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[42c0 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42c1 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[42c2 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes
[42c3 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes
[42c4 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42c5 02-22 00:15:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42c6 02-22 00:15:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:9195053533466398884 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[42c7 02-22 00:15:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:9195053533466398884 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[42c8 02-22 00:15:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:9195053533466398884 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[42c9 02-22 00:15:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42ca 02-22 00:15:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42cb 02-22 00:15:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42cc 02-22 00:15:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42cd 02-22 00:15:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42ce 02-22 00:15:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42cf 02-22 00:15:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[42d0 02-22 00:15:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42d1 02-22 00:15:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[42d2 02-22 00:15:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[42d3 02-22 00:15:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510131801
[42d4 02-22 00:15:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4C7E3BE141D162FE88FEF9121282F24DE72534B6D9CB7301104EAA02DE2AFF8E
[42d5 02-22 00:15:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[42d6 02-22 00:15:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42d7 02-22 00:15:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42d8 02-22 00:15:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42d9 02-22 00:15:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42da 02-22 00:15:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:19 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[42db 02-22 00:15:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42dc 02-22 00:15:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:19 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[42dd 02-22 00:15:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42de 02-22 00:15:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42df 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[42e0 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[42e1 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes
[42e2 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[42e3 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[42e4 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[42e5 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[42e6 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[42e7 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[42e8 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[42e9 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[42ea 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[42eb 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 a0 6d cc c8 94 b0 5a 70 78 20 a0 a6 53 ab b3 |..m....Zpx ..S..|
00000010 40 04 40 4f d6 62 8c ba e1 97 8f e0 b1 2f 54 51 |@.@O.b......./TQ|
[42ec 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 9d a1 ab 2f 6e 88 02 17 1a c3 |0E.!...../n.....|
00000010 7f ed 65 fe 35 ce 37 c8 0a 5d 08 99 41 77 5c d2 |..e.5.7..]..Aw\.|
00000020 f5 54 7a 4a be 02 20 0e 72 7e 01 fb 27 19 68 52 |.TzJ.. .r~..'.hR|
00000030 cf 75 8a 2d a1 db 8a 3a 37 cf ae 9d f2 5e ca e3 |.u.-...:7....^..|
00000040 44 1c ac dc dd a8 c3 |D......|
[42ed 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[42ee 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5750 gate 1582330514381914600 evaluation starts
[42ef 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5750 signed by 0 principal evaluation starts (used [false])
[42f0 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5750 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[42f1 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[42f2 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5750 principal evaluation fails
[42f3 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5750 gate 1582330514381914600 evaluation fails
[42f4 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[42f5 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[42f6 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[42f7 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 a0 6d cc c8 94 b0 5a 70 78 20 a0 a6 53 ab b3 |..m....Zpx ..S..|
00000010 40 04 40 4f d6 62 8c ba e1 97 8f e0 b1 2f 54 51 |@.@O.b......./TQ|
[42f8 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 9d a1 ab 2f 6e 88 02 17 1a c3 |0E.!...../n.....|
00000010 7f ed 65 fe 35 ce 37 c8 0a 5d 08 99 41 77 5c d2 |..e.5.7..]..Aw\.|
00000020 f5 54 7a 4a be 02 20 0e 72 7e 01 fb 27 19 68 52 |.TzJ.. .r~..'.hR|
00000030 cf 75 8a 2d a1 db 8a 3a 37 cf ae 9d f2 5e ca e3 |.u.-...:7....^..|
00000040 44 1c ac dc dd a8 c3 |D......|
[42f9 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[42fa 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8050 gate 1582330514382790000 evaluation starts
[42fb 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8050 signed by 0 principal evaluation starts (used [false])
[42fc 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8050 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[42fd 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8050 principal evaluation succeeds for identity 0
[42fe 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8050 gate 1582330514382790000 evaluation succeeds
[42ff 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4300 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4301 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4302 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4303 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[4304 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes]}
[4305 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:55
[4306 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:55
[4307 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:54 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[4308 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4309 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[430a 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[430b 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes
[430c 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[430d 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[430e 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[430f 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4310 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[4311 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[4312 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4313 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[4314 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4315 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4316 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4317 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4318 02-22 00:15:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4319 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[431a 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[431b 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[431d 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[431e 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[431f 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[4320 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[431c 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4321 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[4322 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:8762008506259896778 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[4323 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[4324 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes
[4326 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:8762008506259896778 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4328 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4327 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4329 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes
[432a 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4325 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13767072124547483357 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[432c 02-22 00:15:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13767072124547483357 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[432d 02-22 00:15:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[432b 02-22 00:15:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[432e 02-22 00:15:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17285336194997302703 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[432f 02-22 00:15:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8762008506259896778 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[4330 02-22 00:15:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8762008506259896778 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[4331 02-22 00:15:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8762008506259896778 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[4332 02-22 00:15:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4333 02-22 00:15:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17285336194997302703 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4334 02-22 00:15:14.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17285336194997302703 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[4335 02-22 00:15:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17285336194997302703 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[4336 02-22 00:15:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4337 02-22 00:15:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4338 02-22 00:15:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13767072124547483357 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[4339 02-22 00:15:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13767072124547483357 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[433a 02-22 00:15:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[433b 02-22 00:15:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[433c 02-22 00:15:14.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[433d 02-22 00:15:14.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[433e 02-22 00:15:14.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[433f 02-22 00:15:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4340 02-22 00:15:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4341 02-22 00:15:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4342 02-22 00:15:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4343 02-22 00:15:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[4344 02-22 00:15:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4345 02-22 00:15:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4346 02-22 00:15:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4347 02-22 00:15:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4348 02-22 00:15:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4349 02-22 00:15:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[434a 02-22 00:15:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[434b 02-22 00:15:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d 69 e7 c3 5c a6 ef a0 c8 79 c0 34 b3 0c 88 93 |]i..\....y.4....|
00000010 41 ec 9e ef 6b 32 4c b0 7a 1f 00 44 c7 2c e4 8c |A...k2L.z..D.,..|
[434c 02-22 00:15:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c df e6 5b 50 29 5a 6a 98 9b f2 a7 |0D. |..[P)Zj....|
00000010 df 36 a1 43 89 09 8c 57 4b 4a aa 5d b2 92 25 0b |.6.C...WKJ.]..%.|
00000020 97 61 7a 5e 02 20 4e 91 ed 98 df 43 2d a1 66 10 |.az^. N....C-.f.|
00000030 e6 cf 7a 9d 85 ac 8c b5 46 13 62 5c e0 f5 e4 91 |..z.....F.b\....|
00000040 f4 12 b6 91 00 9e |......|
[434d 02-22 00:15:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[434e 02-22 00:15:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003646b30 gate 1582330514473784400 evaluation starts
[434f 02-22 00:15:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003646b30 signed by 0 principal evaluation starts (used [false])
[4350 02-22 00:15:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003646b30 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4351 02-22 00:15:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003646b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4352 02-22 00:15:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003646b30 principal evaluation fails
[4353 02-22 00:15:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003646b30 gate 1582330514473784400 evaluation fails
[4354 02-22 00:15:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4355 02-22 00:15:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4356 02-22 00:15:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4357 02-22 00:15:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d 69 e7 c3 5c a6 ef a0 c8 79 c0 34 b3 0c 88 93 |]i..\....y.4....|
00000010 41 ec 9e ef 6b 32 4c b0 7a 1f 00 44 c7 2c e4 8c |A...k2L.z..D.,..|
[4358 02-22 00:15:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c df e6 5b 50 29 5a 6a 98 9b f2 a7 |0D. |..[P)Zj....|
00000010 df 36 a1 43 89 09 8c 57 4b 4a aa 5d b2 92 25 0b |.6.C...WKJ.]..%.|
00000020 97 61 7a 5e 02 20 4e 91 ed 98 df 43 2d a1 66 10 |.az^. N....C-.f.|
00000030 e6 cf 7a 9d 85 ac 8c b5 46 13 62 5c e0 f5 e4 91 |..z.....F.b\....|
00000040 f4 12 b6 91 00 9e |......|
[4359 02-22 00:15:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[435a 02-22 00:15:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360da80 gate 1582330514489347100 evaluation starts
[435b 02-22 00:15:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360da80 signed by 0 principal evaluation starts (used [false])
[435c 02-22 00:15:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360da80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[435d 02-22 00:15:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[435e 02-22 00:15:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360da80 principal evaluation succeeds for identity 0
[435f 02-22 00:15:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360da80 gate 1582330514489347100 evaluation succeeds
[4360 02-22 00:15:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4361 02-22 00:15:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4362 02-22 00:15:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4363 02-22 00:15:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4364 02-22 00:15:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes
[4365 02-22 00:15:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes]}
[4366 02-22 00:15:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:58
[4367 02-22 00:15:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:58
[4368 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[4369 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[436a 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[436b 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[436c 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[436d 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[436e 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[436f 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4370 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4371 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4372 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4373 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4374 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4377 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4378 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4375 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4379 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[437a 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 18 0f 19 4d 6e 58 c6 5e 5b ff f0 b2 45 be 17 |`...MnX.^[...E..|
00000010 d7 57 5f 16 16 8b a9 5a 06 f8 77 8b 58 8c b2 0d |.W_....Z..w.X...|
[437b 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 45 44 39 af a3 a5 fa 76 86 73 |0E.!..ED9....v.s|
00000010 8b 80 90 08 0b 2e 7d 42 aa 26 7c 67 05 f4 2d eb |......}B.&|g..-.|
00000020 34 6e 08 3f d2 02 20 4f db 17 6d 01 5a 16 34 d0 |4n.?.. O..m.Z.4.|
00000030 e0 89 9b fa e9 a8 83 59 d0 81 cf 4b 10 09 8d 3f |.......Y...K...?|
00000040 da bd b7 da b1 18 ba |.......|
[437c 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[437d 02-22 00:15:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[437e 02-22 00:15:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[437f 02-22 00:15:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4376 02-22 00:15:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4380 02-22 00:15:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4381 02-22 00:15:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e640 gate 1582330514516748100 evaluation starts
[4382 02-22 00:15:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e640 signed by 0 principal evaluation starts (used [false])
[4383 02-22 00:15:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e640 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4384 02-22 00:15:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4385 02-22 00:15:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e640 principal evaluation fails
[4386 02-22 00:15:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e640 gate 1582330514516748100 evaluation fails
[4387 02-22 00:15:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4388 02-22 00:15:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4389 02-22 00:15:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[438a 02-22 00:15:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 18 0f 19 4d 6e 58 c6 5e 5b ff f0 b2 45 be 17 |`...MnX.^[...E..|
00000010 d7 57 5f 16 16 8b a9 5a 06 f8 77 8b 58 8c b2 0d |.W_....Z..w.X...|
[438b 02-22 00:15:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 45 44 39 af a3 a5 fa 76 86 73 |0E.!..ED9....v.s|
00000010 8b 80 90 08 0b 2e 7d 42 aa 26 7c 67 05 f4 2d eb |......}B.&|g..-.|
00000020 34 6e 08 3f d2 02 20 4f db 17 6d 01 5a 16 34 d0 |4n.?.. O..m.Z.4.|
00000030 e0 89 9b fa e9 a8 83 59 d0 81 cf 4b 10 09 8d 3f |.......Y...K...?|
00000040 da bd b7 da b1 18 ba |.......|
[438c 02-22 00:15:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[438d 02-22 00:15:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366ef40 gate 1582330514527940400 evaluation starts
[438e 02-22 00:15:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366ef40 signed by 0 principal evaluation starts (used [false])
[438f 02-22 00:15:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366ef40 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4390 02-22 00:15:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366ef40 principal evaluation succeeds for identity 0
[4391 02-22 00:15:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366ef40 gate 1582330514527940400 evaluation succeeds
[4392 02-22 00:15:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4393 02-22 00:15:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4394 02-22 00:15:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4395 02-22 00:15:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4396 02-22 00:15:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[4397 02-22 00:15:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes]}
[4398 02-22 00:15:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:56
[4399 02-22 00:15:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:56
[439a 02-22 00:15:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[439b 02-22 00:15:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[439c 02-22 00:15:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[439d 02-22 00:15:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[439e 02-22 00:15:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[439f 02-22 00:15:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[43a0 02-22 00:15:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[43a1 02-22 00:15:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[43a2 02-22 00:15:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[43a3 02-22 00:15:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[43a4 02-22 00:15:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[43a5 02-22 00:15:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[43a6 02-22 00:15:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151036
[43a7 02-22 00:15:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B3986F2FCC60E66E245D01CBD1F8FF9D11EC0F95BE4967E44A7A8D48094F2DD8
[43a8 02-22 00:15:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[43a9 02-22 00:15:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[43aa 02-22 00:15:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[43ab 02-22 00:15:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[43ac 02-22 00:15:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[43ad 02-22 00:15:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[43ae 02-22 00:15:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[43b0 02-22 00:15:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[43b1 02-22 00:15:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[43af 02-22 00:15:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[43b3 02-22 00:15:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[43b2 02-22 00:15:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[43b4 02-22 00:15:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[43b5 02-22 00:15:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[43b6 02-22 00:15:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[43b7 02-22 00:15:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[43b8 02-22 00:15:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[43b9 02-22 00:15:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 98 6f 2f cc 60 e6 6e 24 5d 01 cb d1 f8 ff 9d |..o/.`.n$]......|
00000010 11 ec 0f 95 be 49 67 e4 4a 7a 8d 48 09 4f 2d d8 |.....Ig.Jz.H.O-.|
[43ba 02-22 00:15:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 93 da 7d e9 dd 43 5d 27 ba e4 58 |0D. 9..}..C]'..X|
00000010 8f ce c4 e8 2b 51 aa 91 af 01 ca 62 04 7e 8c 71 |....+Q.....b.~.q|
00000020 b6 93 85 e2 02 20 6e 49 6f 5f c7 41 81 4f 0e c2 |..... nIo_.A.O..|
00000030 ca 3b 3f 0b c3 3c 06 79 72 d5 a8 bc 4e a6 68 a8 |.;?..<.yr...N.h.|
00000040 cf b1 31 9a b2 40 |..1..@|
[43bb 02-22 00:15:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[43bc 02-22 00:15:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 b5 b5 ca 73 f2 78 23 a8 3f 4d |0E.!.....s.x#.?M|
00000010 c2 fb ca b0 57 25 f1 6b 8f f0 dd 08 fc cd 0f 3a |....W%.k.......:|
00000020 73 da 74 c1 c0 02 20 55 fe 93 34 bf 24 15 f0 8f |s.t... U..4.$...|
00000030 b5 8d 02 53 2c 76 bc 81 9b 70 eb 6f d8 ec 6f 65 |...S,v...p.o..oe|
00000040 aa 19 6a 14 1d e3 e0 |..j....|
[43bd 02-22 00:15:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[43be 02-22 00:15:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[43bf 02-22 00:15:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[43c0 02-22 00:15:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[43c1 02-22 00:15:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[43c2 02-22 00:15:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[43c3 02-22 00:15:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[43c4 02-22 00:15:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[43c5 02-22 00:15:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[43c6 02-22 00:15:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 60 58 02 de 37 2a 77 51 95 29 b3 3c 4d f1 6e |.`X..7*wQ.).<M.n|
00000010 b8 aa b1 ad 72 d4 93 6d 10 d1 f1 3f f2 e3 bd 9a |....r..m...?....|
[43c7 02-22 00:15:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 d0 44 c6 e3 b8 a4 71 f0 8e 1b |0E.!...D....q...|
00000010 9f 8f bc 2a 58 b7 5f aa 15 61 bf e2 ec 97 7f 0c |...*X._..a......|
00000020 d2 c6 56 ad 0f 02 20 7f 12 25 30 d4 d7 4c 94 f0 |..V... ..%0..L..|
00000030 53 41 58 2a 13 a5 a6 30 38 0e 6f 28 5c 98 51 c1 |SAX*...08.o(\.Q.|
00000040 a0 6f a7 bc bf d5 73 |.o....s|
[43c8 02-22 00:15:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes
[43c9 02-22 00:15:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[43ca 02-22 00:15:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[43cb 02-22 00:15:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[43cc 02-22 00:15:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[43cd 02-22 00:15:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[43ce 02-22 00:15:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[43cf 02-22 00:15:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[43d0 02-22 00:15:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[43d1 02-22 00:15:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[43d2 02-22 00:15:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 18 0f 19 4d 6e 58 c6 5e 5b ff f0 b2 45 be 17 |`...MnX.^[...E..|
00000010 d7 57 5f 16 16 8b a9 5a 06 f8 77 8b 58 8c b2 0d |.W_....Z..w.X...|
[43d3 02-22 00:15:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 45 44 39 af a3 a5 fa 76 86 73 |0E.!..ED9....v.s|
00000010 8b 80 90 08 0b 2e 7d 42 aa 26 7c 67 05 f4 2d eb |......}B.&|g..-.|
00000020 34 6e 08 3f d2 02 20 4f db 17 6d 01 5a 16 34 d0 |4n.?.. O..m.Z.4.|
00000030 e0 89 9b fa e9 a8 83 59 d0 81 cf 4b 10 09 8d 3f |.......Y...K...?|
00000040 da bd b7 da b1 18 ba |.......|
[43d4 02-22 00:15:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[43d5 02-22 00:15:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e3120 gate 1582330514595706400 evaluation starts
[43d6 02-22 00:15:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e3120 signed by 0 principal evaluation starts (used [false])
[43d7 02-22 00:15:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e3120 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[43d8 02-22 00:15:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e3120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[43d9 02-22 00:15:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e3120 principal evaluation fails
[43da 02-22 00:15:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e3120 gate 1582330514595706400 evaluation fails
[43db 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[43dc 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[43dd 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[43de 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 18 0f 19 4d 6e 58 c6 5e 5b ff f0 b2 45 be 17 |`...MnX.^[...E..|
00000010 d7 57 5f 16 16 8b a9 5a 06 f8 77 8b 58 8c b2 0d |.W_....Z..w.X...|
[43df 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 45 44 39 af a3 a5 fa 76 86 73 |0E.!..ED9....v.s|
00000010 8b 80 90 08 0b 2e 7d 42 aa 26 7c 67 05 f4 2d eb |......}B.&|g..-.|
00000020 34 6e 08 3f d2 02 20 4f db 17 6d 01 5a 16 34 d0 |4n.?.. O..m.Z.4.|
00000030 e0 89 9b fa e9 a8 83 59 d0 81 cf 4b 10 09 8d 3f |.......Y...K...?|
00000040 da bd b7 da b1 18 ba |.......|
[43e0 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[43e1 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[43e2 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e3a20 gate 1582330514613926900 evaluation starts
[43e3 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e3a20 signed by 0 principal evaluation starts (used [false])
[43e4 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e3a20 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[43e5 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e3a20 principal evaluation succeeds for identity 0
[43e6 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e3a20 gate 1582330514613926900 evaluation succeeds
[43e7 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[43e8 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[43e9 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[43ea 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[43eb 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[43ec 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[43ed 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[43ee 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 98 6f 2f cc 60 e6 6e 24 5d 01 cb d1 f8 ff 9d |..o/.`.n$]......|
00000010 11 ec 0f 95 be 49 67 e4 4a 7a 8d 48 09 4f 2d d8 |.....Ig.Jz.H.O-.|
[43ef 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 93 da 7d e9 dd 43 5d 27 ba e4 58 |0D. 9..}..C]'..X|
00000010 8f ce c4 e8 2b 51 aa 91 af 01 ca 62 04 7e 8c 71 |....+Q.....b.~.q|
00000020 b6 93 85 e2 02 20 6e 49 6f 5f c7 41 81 4f 0e c2 |..... nIo_.A.O..|
00000030 ca 3b 3f 0b c3 3c 06 79 72 d5 a8 bc 4e a6 68 a8 |.;?..<.yr...N.h.|
00000040 cf b1 31 9a b2 40 |..1..@|
[43f0 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes
[43f1 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes
[43f2 02-22 00:15:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[43f3 02-22 00:15:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[43f4 02-22 00:15:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[43f5 02-22 00:15:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[43f6 02-22 00:15:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[43f7 02-22 00:15:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 98 6f 2f cc 60 e6 6e 24 5d 01 cb d1 f8 ff 9d |..o/.`.n$]......|
00000010 11 ec 0f 95 be 49 67 e4 4a 7a 8d 48 09 4f 2d d8 |.....Ig.Jz.H.O-.|
[43f8 02-22 00:15:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 93 da 7d e9 dd 43 5d 27 ba e4 58 |0D. 9..}..C]'..X|
00000010 8f ce c4 e8 2b 51 aa 91 af 01 ca 62 04 7e 8c 71 |....+Q.....b.~.q|
00000020 b6 93 85 e2 02 20 6e 49 6f 5f c7 41 81 4f 0e c2 |..... nIo_.A.O..|
00000030 ca 3b 3f 0b c3 3c 06 79 72 d5 a8 bc 4e a6 68 a8 |.;?..<.yr...N.h.|
00000040 cf b1 31 9a b2 40 |..1..@|
[43f9 02-22 00:15:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes
[43fa 02-22 00:15:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes
[43fb 02-22 00:15:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[43fc 02-22 00:15:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[43fd 02-22 00:15:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 60 58 02 de 37 2a 77 51 95 29 b3 3c 4d f1 6e |.`X..7*wQ.).<M.n|
00000010 b8 aa b1 ad 72 d4 93 6d 10 d1 f1 3f f2 e3 bd 9a |....r..m...?....|
[43fe 02-22 00:15:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 d0 44 c6 e3 b8 a4 71 f0 8e 1b |0E.!...D....q...|
00000010 9f 8f bc 2a 58 b7 5f aa 15 61 bf e2 ec 97 7f 0c |...*X._..a......|
00000020 d2 c6 56 ad 0f 02 20 7f 12 25 30 d4 d7 4c 94 f0 |..V... ..%0..L..|
00000030 53 41 58 2a 13 a5 a6 30 38 0e 6f 28 5c 98 51 c1 |SAX*...08.o(\.Q.|
00000040 a0 6f a7 bc bf d5 73 |.o....s|
[43ff 02-22 00:15:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes
[4400 02-22 00:15:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4401 02-22 00:15:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[4402 02-22 00:15:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4403 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4404 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4405 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4406 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4407 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4408 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4409 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d 69 e7 c3 5c a6 ef a0 c8 79 c0 34 b3 0c 88 93 |]i..\....y.4....|
00000010 41 ec 9e ef 6b 32 4c b0 7a 1f 00 44 c7 2c e4 8c |A...k2L.z..D.,..|
[440a 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c df e6 5b 50 29 5a 6a 98 9b f2 a7 |0D. |..[P)Zj....|
00000010 df 36 a1 43 89 09 8c 57 4b 4a aa 5d b2 92 25 0b |.6.C...WKJ.]..%.|
00000020 97 61 7a 5e 02 20 4e 91 ed 98 df 43 2d a1 66 10 |.az^. N....C-.f.|
00000030 e6 cf 7a 9d 85 ac 8c b5 46 13 62 5c e0 f5 e4 91 |..z.....F.b\....|
00000040 f4 12 b6 91 00 9e |......|
[440b 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[440c 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371b730 gate 1582330514632076300 evaluation starts
[440d 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371b730 signed by 0 principal evaluation starts (used [false])
[440e 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371b730 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[440f 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371b730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4410 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371b730 principal evaluation fails
[4411 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371b730 gate 1582330514632076300 evaluation fails
[4412 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4413 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4414 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4415 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d 69 e7 c3 5c a6 ef a0 c8 79 c0 34 b3 0c 88 93 |]i..\....y.4....|
00000010 41 ec 9e ef 6b 32 4c b0 7a 1f 00 44 c7 2c e4 8c |A...k2L.z..D.,..|
[4416 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c df e6 5b 50 29 5a 6a 98 9b f2 a7 |0D. |..[P)Zj....|
00000010 df 36 a1 43 89 09 8c 57 4b 4a aa 5d b2 92 25 0b |.6.C...WKJ.]..%.|
00000020 97 61 7a 5e 02 20 4e 91 ed 98 df 43 2d a1 66 10 |.az^. N....C-.f.|
00000030 e6 cf 7a 9d 85 ac 8c b5 46 13 62 5c e0 f5 e4 91 |..z.....F.b\....|
00000040 f4 12 b6 91 00 9e |......|
[4417 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4418 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003764030 gate 1582330514634507800 evaluation starts
[4419 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003764030 signed by 0 principal evaluation starts (used [false])
[441a 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003764030 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[441b 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003764030 principal evaluation succeeds for identity 0
[441c 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003764030 gate 1582330514634507800 evaluation succeeds
[441d 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[441e 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[441f 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4420 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4421 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes
[4422 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4423 02-22 00:15:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4424 02-22 00:15:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151037
[4425 02-22 00:15:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FEE47CA0E5FBFC654F572B6859B34269CC2BD8D75093959998B895529FAAC957
[4426 02-22 00:15:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[4427 02-22 00:15:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[4428 02-22 00:15:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[4429 02-22 00:15:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[442a 02-22 00:15:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[442b 02-22 00:15:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[442c 02-22 00:15:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[442d 02-22 00:15:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[442e 02-22 00:15:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[442f 02-22 00:15:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[4430 02-22 00:15:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4431 02-22 00:15:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4432 02-22 00:15:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4433 02-22 00:15:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4434 02-22 00:15:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes
[4435 02-22 00:15:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4436 02-22 00:15:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4437 02-22 00:15:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4438 02-22 00:15:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[4439 02-22 00:15:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[443a 02-22 00:15:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[443b 02-22 00:15:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[443c 02-22 00:15:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[443d 02-22 00:15:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[443e 02-22 00:15:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[443f 02-22 00:15:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4440 02-22 00:15:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4441 02-22 00:15:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4442 02-22 00:15:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4443 02-22 00:15:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4444 02-22 00:15:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4445 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4446 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4447 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4448 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4449 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[444a 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[444b 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[444c 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[444d 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d8b60 gate 1582330515051853600 evaluation starts
[444e 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d8b60 signed by 0 principal evaluation starts (used [false])
[444f 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d8b60 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4450 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d8b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4451 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d8b60 principal evaluation fails
[4452 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d8b60 gate 1582330515051853600 evaluation fails
[4453 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4454 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4455 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4456 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4457 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4458 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4459 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d9460 gate 1582330515053485300 evaluation starts
[445a 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d9460 signed by 0 principal evaluation starts (used [false])
[445b 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d9460 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[445c 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d9460 principal evaluation succeeds for identity 0
[445d 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d9460 gate 1582330515053485300 evaluation succeeds
[445e 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[445f 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4460 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4461 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4462 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[4463 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[4464 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4465 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4466 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4467 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4468 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4469 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[446a 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[446b 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[446c 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[446d 02-22 00:15:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[446e 02-22 00:15:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[446f 02-22 00:15:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380d570 gate 1582330515060217000 evaluation starts
[4470 02-22 00:15:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380d570 signed by 0 principal evaluation starts (used [false])
[4471 02-22 00:15:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380d570 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4472 02-22 00:15:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380d570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4473 02-22 00:15:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380d570 principal evaluation fails
[4474 02-22 00:15:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380d570 gate 1582330515060217000 evaluation fails
[4475 02-22 00:15:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4476 02-22 00:15:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4477 02-22 00:15:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4478 02-22 00:15:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4479 02-22 00:15:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[447a 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[447b 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380de70 gate 1582330515070869500 evaluation starts
[447c 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380de70 signed by 0 principal evaluation starts (used [false])
[447d 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380de70 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[447e 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380de70 principal evaluation succeeds for identity 0
[447f 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380de70 gate 1582330515070869500 evaluation succeeds
[4480 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4481 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4482 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4483 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4484 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[4485 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[4486 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4487 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4488 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[4489 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[448a 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[448b 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[448c 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[448d 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[448e 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[448f 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4490 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4491 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4492 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4493 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4494 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4495 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4496 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4497 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384aec0 gate 1582330515077033300 evaluation starts
[4498 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384aec0 signed by 0 principal evaluation starts (used [false])
[4499 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384aec0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[449a 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384aec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[449b 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384aec0 principal evaluation fails
[449c 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384aec0 gate 1582330515077033300 evaluation fails
[449d 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[449e 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[449f 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[44a0 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[44a1 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[44a2 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[44a3 02-22 00:15:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384b7c0 gate 1582330515079259700 evaluation starts
[44a4 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384b7c0 signed by 0 principal evaluation starts (used [false])
[44a5 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384b7c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[44a6 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384b7c0 principal evaluation succeeds for identity 0
[44a7 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384b7c0 gate 1582330515079259700 evaluation succeeds
[44a8 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[44a9 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[44aa 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[44ab 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[44ac 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44ad 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44ae 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[44af 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[44b0 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[44b1 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[44b2 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[44b3 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[44b4 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[44b5 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[44b6 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[44b7 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003881220 gate 1582330515084268800 evaluation starts
[44b8 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003881220 signed by 0 principal evaluation starts (used [false])
[44b9 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003881220 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[44ba 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003881220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[44bb 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003881220 principal evaluation fails
[44bc 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003881220 gate 1582330515084268800 evaluation fails
[44bd 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[44be 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[44bf 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[44c0 02-22 00:15:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[44c1 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[44c2 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[44c3 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003881b20 gate 1582330515091671300 evaluation starts
[44c4 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003881b20 signed by 0 principal evaluation starts (used [false])
[44c5 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003881b20 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[44c6 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003881b20 principal evaluation succeeds for identity 0
[44c7 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003881b20 gate 1582330515091671300 evaluation succeeds
[44c8 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[44c9 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[44ca 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[44cb 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[44cc 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[44cd 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[44ce 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44cf 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44d0 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44d1 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[44d2 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[44d3 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[44d4 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[44d5 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[44d6 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[44d7 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[44d8 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[44d9 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[44da 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a1830 gate 1582330515098744400 evaluation starts
[44db 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a1830 signed by 0 principal evaluation starts (used [false])
[44dc 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a1830 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[44dd 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a1830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[44de 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a1830 principal evaluation fails
[44df 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a1830 gate 1582330515098744400 evaluation fails
[44e0 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[44e1 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[44e2 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[44e3 02-22 00:15:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[44e4 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[44e5 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[44e6 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4130 gate 1582330515101074600 evaluation starts
[44e7 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4130 signed by 0 principal evaluation starts (used [false])
[44e8 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4130 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[44e9 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4130 principal evaluation succeeds for identity 0
[44ea 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4130 gate 1582330515101074600 evaluation succeeds
[44eb 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[44ec 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[44ed 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[44ee 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[44ef 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[44f0 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[44f1 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[44f2 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[44f3 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44f4 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[44f5 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[44f6 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[44f7 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[44f8 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[44f9 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[44fa 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[44fb 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[44fc 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[44fd 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[44fe 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f28f0 gate 1582330515106711300 evaluation starts
[44ff 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f28f0 signed by 0 principal evaluation starts (used [false])
[4500 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f28f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4501 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f28f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4502 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f28f0 principal evaluation fails
[4503 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f28f0 gate 1582330515106711300 evaluation fails
[4504 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4505 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4506 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4507 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4508 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4509 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[450a 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f31f0 gate 1582330515108320600 evaluation starts
[450b 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f31f0 signed by 0 principal evaluation starts (used [false])
[450c 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f31f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[450d 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f31f0 principal evaluation succeeds for identity 0
[450e 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f31f0 gate 1582330515108320600 evaluation succeeds
[450f 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4510 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4511 02-22 00:15:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4512 02-22 00:15:15.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4513 02-22 00:15:15.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4514 02-22 00:15:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4515 02-22 00:15:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4516 02-22 00:15:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[4517 02-22 00:15:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4518 02-22 00:15:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4519 02-22 00:15:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16837025145464417049 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[451a 02-22 00:15:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16837025145464417049 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[451b 02-22 00:15:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[451c 02-22 00:15:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16837025145464417049 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[451d 02-22 00:15:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16837025145464417049 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[451e 02-22 00:15:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[451f 02-22 00:15:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[4520 02-22 00:15:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4521 02-22 00:15:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4522 02-22 00:15:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4523 02-22 00:15:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8714667872823409917 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[4524 02-22 00:15:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8714667872823409917 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[4525 02-22 00:15:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[4526 02-22 00:15:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4527 02-22 00:15:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[4528 02-22 00:15:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4529 02-22 00:15:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[452a 02-22 00:15:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[452b 02-22 00:15:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[452c 02-22 00:15:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[452d 02-22 00:15:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[452e 02-22 00:15:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[452f 02-22 00:15:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4530 02-22 00:15:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4531 02-22 00:15:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4532 02-22 00:15:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:11138176979860028127 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4533 02-22 00:15:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:11138176979860028127 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4534 02-22 00:15:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4535 02-22 00:15:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4536 02-22 00:15:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4537 02-22 00:15:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4538 02-22 00:15:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4539 02-22 00:15:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[453a 02-22 00:15:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[453b 02-22 00:15:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[453c 02-22 00:15:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[453d 02-22 00:15:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[453e 02-22 00:15:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[453f 02-22 00:15:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[4540 02-22 00:15:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 64 9f 43 f1 4e 8c e0 ee 6b bd 9a 4a ff 22 2d |vd.C.N...k..J."-|
00000010 3e 51 4f 36 90 d4 93 b6 e7 8d bf 42 13 64 72 78 |>QO6.......B.drx|
[4541 02-22 00:15:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 14 58 4e 8d b6 d2 55 94 05 e8 3a |0D. 4.XN...U...:|
00000010 97 ee 71 1f ca 61 04 c8 64 89 50 d2 bf 78 e7 2f |..q..a..d.P..x./|
00000020 5d f9 ab 8a 02 20 6c db 48 cd 0d b0 55 37 a8 b1 |].... l.H...U7..|
00000030 83 d3 60 2b f2 02 82 ca 45 0a f1 0b 1c 8b 13 b4 |..`+....E.......|
00000040 cb ad 77 ee 46 87 |..w.F.|
[4542 02-22 00:15:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[4543 02-22 00:15:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 19 bf 7e da 21 9f 9f 69 d9 66 7d |0D. '..~.!..i.f}|
00000010 fc f5 4c 28 de d6 55 89 07 1e 0a ef f3 df e1 65 |..L(..U........e|
00000020 4b 38 a6 d0 02 20 41 94 6c f5 c1 15 d8 37 f7 8e |K8... A.l....7..|
00000030 7f b9 2d c9 9e a1 9d 0e db 81 ca 32 44 21 97 53 |..-........2D!.S|
00000040 d1 29 2f 6a 7b 09 |.)/j{.|
[4544 02-22 00:15:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4545 02-22 00:15:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[4546 02-22 00:15:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:60
[4547 02-22 00:15:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:60
[4548 02-22 00:15:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[4549 02-22 00:15:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[454a 02-22 00:15:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[454b 02-22 00:15:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[454c 02-22 00:15:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[454d 02-22 00:15:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[454e 02-22 00:15:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[454f 02-22 00:15:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[4550 02-22 00:15:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[4551 02-22 00:15:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[4552 02-22 00:15:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4553 02-22 00:15:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:17442639241928921168 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4554 02-22 00:15:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:17442639241928921168 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4555 02-22 00:15:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[4556 02-22 00:15:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4557 02-22 00:15:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:16618523501628315065 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4558 02-22 00:15:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:16618523501628315065 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4559 02-22 00:15:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:16618523501628315065 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[455a 02-22 00:15:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[455b 02-22 00:15:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[455c 02-22 00:15:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[455d 02-22 00:15:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[455e 02-22 00:15:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[455f 02-22 00:15:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4560 02-22 00:15:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[4561 02-22 00:15:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4562 02-22 00:15:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[4563 02-22 00:15:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13785552173536054511 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[4564 02-22 00:15:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[4565 02-22 00:15:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:230763222561754312 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[4566 02-22 00:15:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[4567 02-22 00:15:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:6046028438743452957 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[4568 02-22 00:15:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:6046028438743452957 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4569 02-22 00:15:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[456a 02-22 00:15:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13785552173536054511 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[456b 02-22 00:15:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[456c 02-22 00:15:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:230763222561754312 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[456d 02-22 00:15:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[456e 02-22 00:15:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 230763222561754312 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[456f 02-22 00:15:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 230763222561754312 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[4570 02-22 00:15:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4571 02-22 00:15:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6046028438743452957 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[4572 02-22 00:15:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6046028438743452957 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[4573 02-22 00:15:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4574 02-22 00:15:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13785552173536054511 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[4575 02-22 00:15:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13785552173536054511 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[4576 02-22 00:15:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13785552173536054511 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[4577 02-22 00:15:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4578 02-22 00:15:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4579 02-22 00:15:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[457a 02-22 00:15:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[457b 02-22 00:15:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[457c 02-22 00:15:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[457d 02-22 00:15:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[457e 02-22 00:15:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[457f 02-22 00:15:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4580 02-22 00:15:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4581 02-22 00:15:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4582 02-22 00:15:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4583 02-22 00:15:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4584 02-22 00:15:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 14 15 8f b1 23 7f 8b 40 e9 06 47 db 13 e5 71 |.....#..@..G...q|
00000010 1c 2e 2b 21 77 75 4e 2b 5b 05 31 2d f3 5d 58 8f |..+!wuN+[.1-.]X.|
[4585 02-22 00:15:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 28 1c 0b f4 a9 f4 f5 a4 93 19 |0E.!..(.........|
00000010 5d 4a af 84 a3 d0 82 3c a0 30 b7 24 a6 c5 aa 30 |]J.....<.0.$...0|
00000020 6f e6 4e 01 a1 02 20 3a 0d 4e 37 07 f7 89 65 9c |o.N... :.N7...e.|
00000030 ac 96 26 d1 77 fa b7 4a 77 f0 f8 e4 8e 17 aa ba |..&.w..Jw.......|
00000040 c6 c0 ad 58 41 13 fc |...XA..|
[4586 02-22 00:15:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4587 02-22 00:15:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c7e0 gate 1582330518472179500 evaluation starts
[4588 02-22 00:15:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c7e0 signed by 0 principal evaluation starts (used [false])
[4589 02-22 00:15:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c7e0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[458a 02-22 00:15:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c7e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[458b 02-22 00:15:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c7e0 principal evaluation fails
[458c 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3c7e0 gate 1582330518472179500 evaluation fails
[458d 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[458e 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[458f 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4590 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 14 15 8f b1 23 7f 8b 40 e9 06 47 db 13 e5 71 |.....#..@..G...q|
00000010 1c 2e 2b 21 77 75 4e 2b 5b 05 31 2d f3 5d 58 8f |..+!wuN+[.1-.]X.|
[4591 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 28 1c 0b f4 a9 f4 f5 a4 93 19 |0E.!..(.........|
00000010 5d 4a af 84 a3 d0 82 3c a0 30 b7 24 a6 c5 aa 30 |]J.....<.0.$...0|
00000020 6f e6 4e 01 a1 02 20 3a 0d 4e 37 07 f7 89 65 9c |o.N... :.N7...e.|
00000030 ac 96 26 d1 77 fa b7 4a 77 f0 f8 e4 8e 17 aa ba |..&.w..Jw.......|
00000040 c6 c0 ad 58 41 13 fc |...XA..|
[4592 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4593 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3d0e0 gate 1582330518484354000 evaluation starts
[4594 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3d0e0 signed by 0 principal evaluation starts (used [false])
[4595 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3d0e0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4596 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3d0e0 principal evaluation succeeds for identity 0
[4597 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3d0e0 gate 1582330518484354000 evaluation succeeds
[4598 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4599 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[459a 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[459b 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[459c 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes
[459d 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes]}
[459e 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:59
[459f 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:59
[45a0 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[45a1 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45a2 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45a3 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[45a4 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[45a5 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[45a6 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[45a7 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[45a8 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[45a9 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[45aa 02-22 00:15:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45ab 02-22 00:15:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[45ac 02-22 00:15:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45ad 02-22 00:15:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45ae 02-22 00:15:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[45af 02-22 00:15:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[45b0 02-22 00:15:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[45b1 02-22 00:15:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[45b2 02-22 00:15:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[45b3 02-22 00:15:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[45b4 02-22 00:15:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[45b5 02-22 00:15:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[45b6 02-22 00:15:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[45b7 02-22 00:15:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 a2 37 12 23 08 65 71 7f 53 6b 62 69 ab 3d 4b |..7.#.eq.Skbi.=K|
00000010 34 9e 8f 59 15 1a 04 59 4c 84 be e4 84 39 3c 12 |4..Y...YL....9<.|
[45b8 02-22 00:15:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 bb d7 ca 81 32 de 0c 6d 05 42 |0E.!......2..m.B|
00000010 cb a5 9e 8b 6f 4d 4a 06 99 d3 cc 04 cf 66 35 04 |....oMJ......f5.|
00000020 25 ca 22 6f ae 02 20 20 35 71 c2 30 44 90 93 ce |%."o.. 5q.0D...|
00000030 b4 56 37 cf 07 b7 23 d9 8d 23 9d 75 58 8d c8 15 |.V7...#..#.uX...|
00000040 9a 8f 2e 14 b8 c7 b2 |.......|
[45b9 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[45ba 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5f4b0 gate 1582330518521126600 evaluation starts
[45bb 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5f4b0 signed by 0 principal evaluation starts (used [false])
[45bc 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5f4b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[45bd 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5f4b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[45be 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5f4b0 principal evaluation fails
[45bf 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5f4b0 gate 1582330518521126600 evaluation fails
[45c0 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[45c1 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[45c2 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[45c3 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 a2 37 12 23 08 65 71 7f 53 6b 62 69 ab 3d 4b |..7.#.eq.Skbi.=K|
00000010 34 9e 8f 59 15 1a 04 59 4c 84 be e4 84 39 3c 12 |4..Y...YL....9<.|
[45c4 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 bb d7 ca 81 32 de 0c 6d 05 42 |0E.!......2..m.B|
00000010 cb a5 9e 8b 6f 4d 4a 06 99 d3 cc 04 cf 66 35 04 |....oMJ......f5.|
00000020 25 ca 22 6f ae 02 20 20 35 71 c2 30 44 90 93 ce |%."o.. 5q.0D...|
00000030 b4 56 37 cf 07 b7 23 d9 8d 23 9d 75 58 8d c8 15 |.V7...#..#.uX...|
00000040 9a 8f 2e 14 b8 c7 b2 |.......|
[45c5 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[45c6 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5fdb0 gate 1582330518526210600 evaluation starts
[45c7 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5fdb0 signed by 0 principal evaluation starts (used [false])
[45c8 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5fdb0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[45c9 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5fdb0 principal evaluation succeeds for identity 0
[45ca 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5fdb0 gate 1582330518526210600 evaluation succeeds
[45cb 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[45cc 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[45cd 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[45ce 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[45cf 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[45d0 02-22 00:15:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes]}
[45d1 02-22 00:15:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:57
[45d2 02-22 00:15:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:57
[45d3 02-22 00:15:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[45d4 02-22 00:15:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45d5 02-22 00:15:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45d6 02-22 00:15:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45d7 02-22 00:15:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[45d8 02-22 00:15:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[45d9 02-22 00:15:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[45da 02-22 00:15:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[45db 02-22 00:15:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[45dc 02-22 00:15:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[45dd 02-22 00:15:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[45de 02-22 00:15:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45df 02-22 00:15:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151038
[45e0 02-22 00:15:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D887E3A4CA0F9A17EEF2DDE5EC707D47C6A12F6F79E5FFDC30EAEA9D6EBA6A59
[45e1 02-22 00:15:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[45e2 02-22 00:15:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[45e3 02-22 00:15:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[45e4 02-22 00:15:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[45e5 02-22 00:15:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[45e6 02-22 00:15:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[45e7 02-22 00:15:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[45e8 02-22 00:15:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[45e9 02-22 00:15:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45ea 02-22 00:15:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[45eb 02-22 00:15:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45ec 02-22 00:15:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[45ed 02-22 00:15:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45ee 02-22 00:15:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[45ef 02-22 00:15:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[45f0 02-22 00:15:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45f1 02-22 00:15:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[45f2 02-22 00:15:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[45f3 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[45f4 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 87 e3 a4 ca 0f 9a 17 ee f2 dd e5 ec 70 7d 47 |.............p}G|
00000010 c6 a1 2f 6f 79 e5 ff dc 30 ea ea 9d 6e ba 6a 59 |../oy...0...n.jY|
[45f5 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 09 66 23 e3 e4 cf 87 69 a7 0b |0E.!...f#....i..|
00000010 c7 27 26 19 3b 9d 49 76 a6 0d 89 6a d0 53 6e f4 |.'&.;.Iv...j.Sn.|
00000020 f1 6a ca df c6 02 20 1f d4 4f fd 1f 32 67 91 9e |.j.... ..O..2g..|
00000030 45 cc a9 de 6d 27 79 60 5c 27 c2 ca a7 cc 82 31 |E...m'y`\'.....1|
00000040 f3 6d 27 ca 5d b7 60 |.m'.].`|
[45f6 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[45f7 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f ba 08 7d bd e0 db 50 5a 20 46 |0E.!....}...PZ F|
00000010 8a 27 b6 77 82 21 a0 e9 61 33 41 ee 8f 3e ff 8f |.'.w.!..a3A..>..|
00000020 76 a9 4b ab ca 02 20 5c 19 17 ad af 45 b1 97 70 |v.K... \....E..p|
00000030 d6 81 e0 10 1e dd bf f2 34 aa 0d 1b d6 50 00 f7 |........4....P..|
00000040 ff 00 f1 79 e9 98 56 |...y..V|
[45f8 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[45f9 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[45fa 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45fb 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[45fc 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[45fd 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[45fe 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[45ff 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4600 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4601 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4602 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4603 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4604 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4605 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 a2 37 12 23 08 65 71 7f 53 6b 62 69 ab 3d 4b |..7.#.eq.Skbi.=K|
00000010 34 9e 8f 59 15 1a 04 59 4c 84 be e4 84 39 3c 12 |4..Y...YL....9<.|
[4606 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 bb d7 ca 81 32 de 0c 6d 05 42 |0E.!......2..m.B|
00000010 cb a5 9e 8b 6f 4d 4a 06 99 d3 cc 04 cf 66 35 04 |....oMJ......f5.|
00000020 25 ca 22 6f ae 02 20 20 35 71 c2 30 44 90 93 ce |%."o.. 5q.0D...|
00000030 b4 56 37 cf 07 b7 23 d9 8d 23 9d 75 58 8d c8 15 |.V7...#..#.uX...|
00000040 9a 8f 2e 14 b8 c7 b2 |.......|
[4607 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4608 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b27240 gate 1582330518597761100 evaluation starts
[4609 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b27240 signed by 0 principal evaluation starts (used [false])
[460a 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b27240 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[460b 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b27240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[460c 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b27240 principal evaluation fails
[460d 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b27240 gate 1582330518597761100 evaluation fails
[460e 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[460f 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4610 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4611 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 a2 37 12 23 08 65 71 7f 53 6b 62 69 ab 3d 4b |..7.#.eq.Skbi.=K|
00000010 34 9e 8f 59 15 1a 04 59 4c 84 be e4 84 39 3c 12 |4..Y...YL....9<.|
[4612 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 bb d7 ca 81 32 de 0c 6d 05 42 |0E.!......2..m.B|
00000010 cb a5 9e 8b 6f 4d 4a 06 99 d3 cc 04 cf 66 35 04 |....oMJ......f5.|
00000020 25 ca 22 6f ae 02 20 20 35 71 c2 30 44 90 93 ce |%."o.. 5q.0D...|
00000030 b4 56 37 cf 07 b7 23 d9 8d 23 9d 75 58 8d c8 15 |.V7...#..#.uX...|
00000040 9a 8f 2e 14 b8 c7 b2 |.......|
[4613 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4614 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b27b40 gate 1582330518599400200 evaluation starts
[4615 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b27b40 signed by 0 principal evaluation starts (used [false])
[4616 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b27b40 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4617 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b27b40 principal evaluation succeeds for identity 0
[4618 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b27b40 gate 1582330518599400200 evaluation succeeds
[4619 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[461a 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[461b 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[461c 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[461d 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes
[461e 02-22 00:15:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[461f 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[4620 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 87 e3 a4 ca 0f 9a 17 ee f2 dd e5 ec 70 7d 47 |.............p}G|
00000010 c6 a1 2f 6f 79 e5 ff dc 30 ea ea 9d 6e ba 6a 59 |../oy...0...n.jY|
[4621 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 09 66 23 e3 e4 cf 87 69 a7 0b |0E.!...f#....i..|
00000010 c7 27 26 19 3b 9d 49 76 a6 0d 89 6a d0 53 6e f4 |.'&.;.Iv...j.Sn.|
00000020 f1 6a ca df c6 02 20 1f d4 4f fd 1f 32 67 91 9e |.j.... ..O..2g..|
00000030 45 cc a9 de 6d 27 79 60 5c 27 c2 ca a7 cc 82 31 |E...m'y`\'.....1|
00000040 f3 6d 27 ca 5d b7 60 |.m'.].`|
[4622 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[4623 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[4624 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4625 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[4626 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 64 9f 43 f1 4e 8c e0 ee 6b bd 9a 4a ff 22 2d |vd.C.N...k..J."-|
00000010 3e 51 4f 36 90 d4 93 b6 e7 8d bf 42 13 64 72 78 |>QO6.......B.drx|
[4627 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 14 58 4e 8d b6 d2 55 94 05 e8 3a |0D. 4.XN...U...:|
00000010 97 ee 71 1f ca 61 04 c8 64 89 50 d2 bf 78 e7 2f |..q..a..d.P..x./|
00000020 5d f9 ab 8a 02 20 6c db 48 cd 0d b0 55 37 a8 b1 |].... l.H...U7..|
00000030 83 d3 60 2b f2 02 82 ca 45 0a f1 0b 1c 8b 13 b4 |..`+....E.......|
00000040 cb ad 77 ee 46 87 |..w.F.|
[4628 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4629 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[462a 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[462b 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[462c 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[462d 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[462e 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[462f 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[4630 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 87 e3 a4 ca 0f 9a 17 ee f2 dd e5 ec 70 7d 47 |.............p}G|
00000010 c6 a1 2f 6f 79 e5 ff dc 30 ea ea 9d 6e ba 6a 59 |../oy...0...n.jY|
[4631 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 09 66 23 e3 e4 cf 87 69 a7 0b |0E.!...f#....i..|
00000010 c7 27 26 19 3b 9d 49 76 a6 0d 89 6a d0 53 6e f4 |.'&.;.Iv...j.Sn.|
00000020 f1 6a ca df c6 02 20 1f d4 4f fd 1f 32 67 91 9e |.j.... ..O..2g..|
00000030 45 cc a9 de 6d 27 79 60 5c 27 c2 ca a7 cc 82 31 |E...m'y`\'.....1|
00000040 f3 6d 27 ca 5d b7 60 |.m'.].`|
[4632 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[4633 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:56 , Envelope: 83 bytes, Signature: 71 bytes
[4634 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4635 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[4636 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 64 9f 43 f1 4e 8c e0 ee 6b bd 9a 4a ff 22 2d |vd.C.N...k..J."-|
00000010 3e 51 4f 36 90 d4 93 b6 e7 8d bf 42 13 64 72 78 |>QO6.......B.drx|
[4637 02-22 00:15:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 14 58 4e 8d b6 d2 55 94 05 e8 3a |0D. 4.XN...U...:|
00000010 97 ee 71 1f ca 61 04 c8 64 89 50 d2 bf 78 e7 2f |..q..a..d.P..x./|
00000020 5d f9 ab 8a 02 20 6c db 48 cd 0d b0 55 37 a8 b1 |].... l.H...U7..|
00000030 83 d3 60 2b f2 02 82 ca 45 0a f1 0b 1c 8b 13 b4 |..`+....E.......|
00000040 cb ad 77 ee 46 87 |..w.F.|
[4638 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4639 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[463a 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[463b 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[463c 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[463d 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[463e 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[463f 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4640 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4641 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4642 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 14 15 8f b1 23 7f 8b 40 e9 06 47 db 13 e5 71 |.....#..@..G...q|
00000010 1c 2e 2b 21 77 75 4e 2b 5b 05 31 2d f3 5d 58 8f |..+!wuN+[.1-.]X.|
[4643 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 28 1c 0b f4 a9 f4 f5 a4 93 19 |0E.!..(.........|
00000010 5d 4a af 84 a3 d0 82 3c a0 30 b7 24 a6 c5 aa 30 |]J.....<.0.$...0|
00000020 6f e6 4e 01 a1 02 20 3a 0d 4e 37 07 f7 89 65 9c |o.N... :.N7...e.|
00000030 ac 96 26 d1 77 fa b7 4a 77 f0 f8 e4 8e 17 aa ba |..&.w..Jw.......|
00000040 c6 c0 ad 58 41 13 fc |...XA..|
[4644 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4645 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbc2c0 gate 1582330518614588700 evaluation starts
[4646 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbc2c0 signed by 0 principal evaluation starts (used [false])
[4647 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbc2c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4648 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbc2c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4649 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbc2c0 principal evaluation fails
[464a 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbc2c0 gate 1582330518614588700 evaluation fails
[464b 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[464c 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[464d 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[464e 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 14 15 8f b1 23 7f 8b 40 e9 06 47 db 13 e5 71 |.....#..@..G...q|
00000010 1c 2e 2b 21 77 75 4e 2b 5b 05 31 2d f3 5d 58 8f |..+!wuN+[.1-.]X.|
[464f 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 28 1c 0b f4 a9 f4 f5 a4 93 19 |0E.!..(.........|
00000010 5d 4a af 84 a3 d0 82 3c a0 30 b7 24 a6 c5 aa 30 |]J.....<.0.$...0|
00000020 6f e6 4e 01 a1 02 20 3a 0d 4e 37 07 f7 89 65 9c |o.N... :.N7...e.|
00000030 ac 96 26 d1 77 fa b7 4a 77 f0 f8 e4 8e 17 aa ba |..&.w..Jw.......|
00000040 c6 c0 ad 58 41 13 fc |...XA..|
[4650 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4651 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbcbc0 gate 1582330518619394100 evaluation starts
[4652 02-22 00:15:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbcbc0 signed by 0 principal evaluation starts (used [false])
[4653 02-22 00:15:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbcbc0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4654 02-22 00:15:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbcbc0 principal evaluation succeeds for identity 0
[4655 02-22 00:15:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bbcbc0 gate 1582330518619394100 evaluation succeeds
[4656 02-22 00:15:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4657 02-22 00:15:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4658 02-22 00:15:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4659 02-22 00:15:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[465a 02-22 00:15:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes
[465b 02-22 00:15:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[465c 02-22 00:15:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[465d 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[465e 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[465f 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[4660 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[4661 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4662 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[4663 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4664 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[4665 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4666 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4667 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4668 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4669 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[466a 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[466b 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[466c 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[466d 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[466e 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[466f 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4670 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4671 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4672 02-22 00:15:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4673 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4674 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be2c00 gate 1582330519050382000 evaluation starts
[4675 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be2c00 signed by 0 principal evaluation starts (used [false])
[4676 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be2c00 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4677 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be2c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4678 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be2c00 principal evaluation fails
[4679 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be2c00 gate 1582330519050382000 evaluation fails
[467a 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[467b 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[467c 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[467d 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[467e 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[467f 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4680 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be3500 gate 1582330519052300500 evaluation starts
[4681 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be3500 signed by 0 principal evaluation starts (used [false])
[4682 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be3500 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4683 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be3500 principal evaluation succeeds for identity 0
[4684 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be3500 gate 1582330519052300500 evaluation succeeds
[4685 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4686 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4687 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4688 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4689 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[468a 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[468b 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[468c 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[468d 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[468e 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[468f 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4690 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4691 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4692 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4693 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4694 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4695 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4696 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf7610 gate 1582330519056763800 evaluation starts
[4697 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf7610 signed by 0 principal evaluation starts (used [false])
[4698 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf7610 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4699 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf7610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[469a 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf7610 principal evaluation fails
[469b 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf7610 gate 1582330519056763800 evaluation fails
[469c 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[469d 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[469e 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[469f 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[46a0 02-22 00:15:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[46a1 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[46a2 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf7f10 gate 1582330519062651200 evaluation starts
[46a3 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf7f10 signed by 0 principal evaluation starts (used [false])
[46a4 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf7f10 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[46a5 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf7f10 principal evaluation succeeds for identity 0
[46a6 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf7f10 gate 1582330519062651200 evaluation succeeds
[46a7 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[46a8 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[46a9 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[46aa 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[46ab 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[46ac 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[46ad 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[46ae 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[46af 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[46b0 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[46b1 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[46b2 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[46b3 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[46b4 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[46b5 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[46b6 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[46b7 02-22 00:15:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[46b8 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[46b9 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[46ba 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[46bb 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c2d0 gate 1582330519076151400 evaluation starts
[46bc 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c2d0 signed by 0 principal evaluation starts (used [false])
[46bd 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c2d0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[46be 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c2d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[46bf 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c2d0 principal evaluation fails
[46c0 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c2d0 gate 1582330519076151400 evaluation fails
[46c1 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[46c2 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[46c3 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[46c4 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[46c5 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[46c6 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[46c7 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2cbd0 gate 1582330519078908500 evaluation starts
[46c8 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2cbd0 signed by 0 principal evaluation starts (used [false])
[46c9 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2cbd0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[46ca 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2cbd0 principal evaluation succeeds for identity 0
[46cb 02-22 00:15:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2cbd0 gate 1582330519078908500 evaluation succeeds
[46cc 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[46cd 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[46ce 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[46cf 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[46d0 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[46d1 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[46d2 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[46d3 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[46d4 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[46d5 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[46d6 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[46d7 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[46d8 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[46d9 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[46da 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[46db 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[46dc 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[46dd 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[46de 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[46df 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c43390 gate 1582330519083895300 evaluation starts
[46e0 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c43390 signed by 0 principal evaluation starts (used [false])
[46e1 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c43390 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[46e2 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c43390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[46e3 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c43390 principal evaluation fails
[46e4 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c43390 gate 1582330519083895300 evaluation fails
[46e5 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[46e6 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[46e7 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[46e8 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[46e9 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[46ea 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[46eb 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c43c90 gate 1582330519085366700 evaluation starts
[46ec 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c43c90 signed by 0 principal evaluation starts (used [false])
[46ed 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c43c90 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[46ee 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c43c90 principal evaluation succeeds for identity 0
[46ef 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c43c90 gate 1582330519085366700 evaluation succeeds
[46f0 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[46f1 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[46f2 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[46f3 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[46f4 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[46f5 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[46f6 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[46f7 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[46f8 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[46f9 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[46fa 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[46fb 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[46fc 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[46fd 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[46fe 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[46ff 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4700 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4701 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4702 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4703 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4704 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4705 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c630 gate 1582330519088709800 evaluation starts
[4706 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c630 signed by 0 principal evaluation starts (used [false])
[4707 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c630 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4708 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4709 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c630 principal evaluation fails
[470a 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c630 gate 1582330519088709800 evaluation fails
[470b 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[470c 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[470d 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[470e 02-22 00:15:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[470f 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4710 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4711 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7cf30 gate 1582330519090736500 evaluation starts
[4712 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7cf30 signed by 0 principal evaluation starts (used [false])
[4713 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7cf30 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4714 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7cf30 principal evaluation succeeds for identity 0
[4715 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7cf30 gate 1582330519090736500 evaluation succeeds
[4716 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4717 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4718 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4719 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[471a 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[471b 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[471c 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[471d 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[471e 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[471f 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4720 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4721 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4722 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4723 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4724 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4725 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c96990 gate 1582330519097483900 evaluation starts
[4726 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c96990 signed by 0 principal evaluation starts (used [false])
[4727 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c96990 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4728 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c96990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4729 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c96990 principal evaluation fails
[472a 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c96990 gate 1582330519097483900 evaluation fails
[472b 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[472c 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[472d 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[472e 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[472f 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4730 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4731 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c97290 gate 1582330519099579200 evaluation starts
[4732 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c97290 signed by 0 principal evaluation starts (used [false])
[4733 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c97290 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4734 02-22 00:15:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c97290 principal evaluation succeeds for identity 0
[4735 02-22 00:15:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c97290 gate 1582330519099579200 evaluation succeeds
[4736 02-22 00:15:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4737 02-22 00:15:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4738 02-22 00:15:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4739 02-22 00:15:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[473a 02-22 00:15:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[473b 02-22 00:15:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[473c 02-22 00:15:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[473d 02-22 00:15:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[473e 02-22 00:15:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[473f 02-22 00:15:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4740 02-22 00:15:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12230704297036840866 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[4741 02-22 00:15:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12230704297036840866 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[4742 02-22 00:15:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4743 02-22 00:15:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12230704297036840866 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[4744 02-22 00:15:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12230704297036840866 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[4745 02-22 00:15:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4746 02-22 00:15:19.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4747 02-22 00:15:19.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4748 02-22 00:15:19.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4749 02-22 00:15:19.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[474a 02-22 00:15:19.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 06 6c 49 c4 43 27 61 20 93 fa e2 dc 4a 2b 7c |..lI.C'a ....J+||
00000010 b9 a1 b5 6a 11 7e 3d 6d fc fc bf 5e a9 d9 df bb |...j.~=m...^....|
[474b 02-22 00:15:19.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 09 9a 95 65 fd 64 dc f6 7c 3e |0E.!.....e.d..|>|
00000010 16 4a 5b f8 64 9a e6 46 23 50 67 bb 03 e2 b5 c4 |.J[.d..F#Pg.....|
00000020 90 84 41 3a 96 02 20 26 50 2c 8c a2 34 53 2e e1 |..A:.. &P,..4S..|
00000030 03 27 6c b9 69 1a 2a 58 a9 8c 8b fc 93 cf 6e f5 |.'l.i.*X......n.|
00000040 26 f7 da 97 38 14 e4 |&...8..|
[474c 02-22 00:15:19.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[474d 02-22 00:15:19.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 55 f9 8d 59 a0 5b 6e a3 6f 8e c2 |0D. %U..Y.[n.o..|
00000010 12 ed 31 2d db b3 dc 73 90 17 4c 21 67 0f 6f cd |..1-...s..L!g.o.|
00000020 f2 70 46 3f 02 20 03 cc b0 cb f0 4a 42 b6 c0 cb |.pF?. .....JB...|
00000030 63 5f d7 9f 77 5b 90 ae ff df bb 21 03 7e a7 e9 |c_..w[.....!.~..|
00000040 56 58 36 03 fa 88 |VX6...|
[474e 02-22 00:15:19.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[474f 02-22 00:15:19.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[4750 02-22 00:15:19.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:61
[4751 02-22 00:15:19.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:61
[4752 02-22 00:15:19.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[4753 02-22 00:15:19.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4754 02-22 00:15:19.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4755 02-22 00:15:19.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4756 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes
[4757 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes
[4758 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4759 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes
[475a 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[475b 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[475c 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[475d 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[475e 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[475f 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4760 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4761 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes
[4762 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4763 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes
[4764 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4765 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes
[4766 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4767 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes
[4768 02-22 00:15:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4769 02-22 00:15:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[476a 02-22 00:15:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[476b 02-22 00:15:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[476c 02-22 00:15:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[476d 02-22 00:15:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[476e 02-22 00:15:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[476f 02-22 00:15:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4770 02-22 00:15:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4771 02-22 00:15:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4772 02-22 00:15:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4773 02-22 00:15:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4774 02-22 00:15:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4775 02-22 00:15:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d c8 52 f9 23 ac ce 54 d6 26 49 fe 1e 14 94 3a |..R.#..T.&I....:|
00000010 88 84 f9 75 f6 f7 b7 68 f4 c1 22 ba be cc bf 9f |...u...h..".....|
[4776 02-22 00:15:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f f7 99 f2 86 be 3d df 3f 27 e1 86 |0D. _.....=.?'..|
00000010 05 9d e6 9a 3b 7c cf 75 53 36 31 47 73 b9 53 2f |....;|.uS61Gs.S/|
00000020 60 90 49 d6 02 20 53 40 3a d2 db 6b 2a 33 f9 a8 |`.I.. S@:..k*3..|
00000030 f0 12 93 0c 6d 57 37 18 fe d2 0e 01 b5 33 b0 d0 |....mW7......3..|
00000040 cc b8 db f0 02 03 |......|
[4777 02-22 00:15:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4778 02-22 00:15:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ceaaf0 gate 1582330519319159700 evaluation starts
[4779 02-22 00:15:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ceaaf0 signed by 0 principal evaluation starts (used [false])
[477a 02-22 00:15:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ceaaf0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[477b 02-22 00:15:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ceaaf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[477c 02-22 00:15:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ceaaf0 principal evaluation fails
[477d 02-22 00:15:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ceaaf0 gate 1582330519319159700 evaluation fails
[477e 02-22 00:15:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[477f 02-22 00:15:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4780 02-22 00:15:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4781 02-22 00:15:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d c8 52 f9 23 ac ce 54 d6 26 49 fe 1e 14 94 3a |..R.#..T.&I....:|
00000010 88 84 f9 75 f6 f7 b7 68 f4 c1 22 ba be cc bf 9f |...u...h..".....|
[4782 02-22 00:15:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f f7 99 f2 86 be 3d df 3f 27 e1 86 |0D. _.....=.?'..|
00000010 05 9d e6 9a 3b 7c cf 75 53 36 31 47 73 b9 53 2f |....;|.uS61Gs.S/|
00000020 60 90 49 d6 02 20 53 40 3a d2 db 6b 2a 33 f9 a8 |`.I.. S@:..k*3..|
00000030 f0 12 93 0c 6d 57 37 18 fe d2 0e 01 b5 33 b0 d0 |....mW7......3..|
00000040 cc b8 db f0 02 03 |......|
[4783 02-22 00:15:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4784 02-22 00:15:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ceb3f0 gate 1582330519326774400 evaluation starts
[4785 02-22 00:15:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4786 02-22 00:15:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ceb3f0 signed by 0 principal evaluation starts (used [false])
[4787 02-22 00:15:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ceb3f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4788 02-22 00:15:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ceb3f0 principal evaluation succeeds for identity 0
[4789 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ceb3f0 gate 1582330519326774400 evaluation succeeds
[478a 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[478b 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[478c 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[478d 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[478e 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[478f 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes]}
[4790 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:60
[4791 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:60
[4792 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[4793 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4794 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4795 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4796 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4797 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4798 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4799 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[479a 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[479b 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[479c 02-22 00:15:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[479d 02-22 00:15:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[479e 02-22 00:15:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[479f 02-22 00:15:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47a0 02-22 00:15:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47a1 02-22 00:15:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47a2 02-22 00:15:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47a3 02-22 00:15:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47a4 02-22 00:15:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[47a5 02-22 00:15:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47a6 02-22 00:15:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[47a7 02-22 00:15:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[47a8 02-22 00:15:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47a9 02-22 00:15:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[47aa 02-22 00:15:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47ab 02-22 00:15:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[47ac 02-22 00:15:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[47ad 02-22 00:15:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510141801
[47ae 02-22 00:15:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9B94AAD8B8E13954F030D70774CF11EA5FA3382D7080C44FA621D2B234B06532
[47af 02-22 00:15:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[47b0 02-22 00:15:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47b1 02-22 00:15:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47b2 02-22 00:15:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47b3 02-22 00:15:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47b4 02-22 00:15:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:20 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[47b5 02-22 00:15:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47b6 02-22 00:15:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47b7 02-22 00:15:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:20 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[47b8 02-22 00:15:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47b9 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[47ba 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47bb 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[47bc 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[47bd 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47be 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[47bf 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[47c0 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[47c1 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[47c2 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[47c3 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[47c4 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 4d fe 7b 3a ba 1c 8e ce 98 65 b6 1b d0 2a 39 |.M.{:.....e...*9|
00000010 07 99 a7 19 40 80 68 8d 6b 2c fc 4c c1 bf 83 0b |....@.h.k,.L....|
[47c5 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd c2 d6 74 e8 92 a9 23 f6 37 d6 |0E.!....t...#.7.|
00000010 1e 97 9e 54 5c a4 60 27 bf 85 37 17 4c 35 01 75 |...T\.`'..7.L5.u|
00000020 b5 db 02 eb 17 02 20 76 0a 4c 1c 9e ab f9 da 81 |...... v.L......|
00000030 0f d0 2f e9 bd 71 7a 15 5d 26 6d 45 8a 01 b2 3c |../..qz.]&mE...<|
00000040 41 7a 18 c5 21 99 a1 |Az..!..|
[47c6 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[47c7 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3c790 gate 1582330519394737900 evaluation starts
[47c8 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3c790 signed by 0 principal evaluation starts (used [false])
[47c9 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3c790 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[47ca 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3c790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[47cb 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3c790 principal evaluation fails
[47cc 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3c790 gate 1582330519394737900 evaluation fails
[47cd 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[47ce 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[47cf 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[47d0 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 4d fe 7b 3a ba 1c 8e ce 98 65 b6 1b d0 2a 39 |.M.{:.....e...*9|
00000010 07 99 a7 19 40 80 68 8d 6b 2c fc 4c c1 bf 83 0b |....@.h.k,.L....|
[47d1 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd c2 d6 74 e8 92 a9 23 f6 37 d6 |0E.!....t...#.7.|
00000010 1e 97 9e 54 5c a4 60 27 bf 85 37 17 4c 35 01 75 |...T\.`'..7.L5.u|
00000020 b5 db 02 eb 17 02 20 76 0a 4c 1c 9e ab f9 da 81 |...... v.L......|
00000030 0f d0 2f e9 bd 71 7a 15 5d 26 6d 45 8a 01 b2 3c |../..qz.]&mE...<|
00000040 41 7a 18 c5 21 99 a1 |Az..!..|
[47d2 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[47d3 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3d090 gate 1582330519397355100 evaluation starts
[47d4 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3d090 signed by 0 principal evaluation starts (used [false])
[47d5 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3d090 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[47d6 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3d090 principal evaluation succeeds for identity 0
[47d7 02-22 00:15:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3d090 gate 1582330519397355100 evaluation succeeds
[47d8 02-22 00:15:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[47d9 02-22 00:15:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[47da 02-22 00:15:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[47db 02-22 00:15:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[47dc 02-22 00:15:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[47dd 02-22 00:15:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes]}
[47de 02-22 00:15:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:58
[47df 02-22 00:15:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:58
[47e0 02-22 00:15:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[47e1 02-22 00:15:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47e2 02-22 00:15:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47e3 02-22 00:15:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47e4 02-22 00:15:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[47e5 02-22 00:15:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47e7 02-22 00:15:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[47e8 02-22 00:15:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[47e6 02-22 00:15:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[47e9 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47ea 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47ed 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47ee 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47ef 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47eb 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[47ec 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47f0 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47f2 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47f3 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47f4 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[47f5 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47f6 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[47f7 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[47f8 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47f1 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47f9 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes
[47fa 02-22 00:15:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47fb 02-22 00:15:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[47fc 02-22 00:15:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47fd 02-22 00:15:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[47fe 02-22 00:15:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[47ff 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151039
[4800 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 25CB9697E4B0BEEC80AB150A1CD0185B91B4FD54ABE5A35D28E5C72DBCCD722E
[4801 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[4802 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[4803 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[4804 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4805 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4806 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4807 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[4808 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[4809 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes
[480a 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[480b 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[480c 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[480d 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes
[480e 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[480f 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:57 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4810 02-22 00:15:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4811 02-22 00:15:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11042213807362533980 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[4812 02-22 00:15:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11042213807362533980 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[4813 02-22 00:15:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[4814 02-22 00:15:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4815 02-22 00:15:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[4816 02-22 00:15:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4817 02-22 00:15:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4818 02-22 00:15:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4819 02-22 00:15:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[481a 02-22 00:15:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[481b 02-22 00:15:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[481c 02-22 00:15:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[481d 02-22 00:15:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[481e 02-22 00:15:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[481f 02-22 00:15:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4820 02-22 00:15:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:79145879826822616 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4821 02-22 00:15:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:79145879826822616 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4822 02-22 00:15:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4823 02-22 00:15:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4824 02-22 00:15:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4825 02-22 00:15:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4826 02-22 00:15:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4827 02-22 00:15:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4828 02-22 00:15:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[4829 02-22 00:15:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[482a 02-22 00:15:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[482b 02-22 00:15:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[482c 02-22 00:15:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[482d 02-22 00:15:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[482e 02-22 00:15:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ca 33 02 da 99 74 b9 d2 33 16 35 69 4d 82 b8 18 |.3...t..3.5iM...|
00000010 1c 9a 79 72 42 c4 94 30 b4 b8 85 1a 7a 3f c4 98 |..yrB..0....z?..|
[482f 02-22 00:15:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 c3 72 db aa 75 f1 a7 b5 aa a0 |0E.!...r..u.....|
00000010 bb 45 c7 66 8f 17 98 46 b1 3e c6 22 97 6b 2c 6a |.E.f...F.>.".k,j|
00000020 31 d5 de 4d e5 02 20 3b c8 51 b8 ff b1 47 9e eb |1..M.. ;.Q...G..|
00000030 66 24 dc 6a 41 2c 70 35 53 cb db 8b 4a aa 5d 96 |f$.jA,p5S...J.].|
00000040 dc 91 4c 3c 6d 2e 28 |..L<m.(|
[4830 02-22 00:15:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[4831 02-22 00:15:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 ee ad 5c c4 2a a8 d6 a9 ac 69 |0E.!....\.*....i|
00000010 af bb 2e 98 2f ca 3a d8 e4 ed af 2c 62 8c b8 1d |..../.:....,b...|
00000020 5e 0c e0 1a b3 02 20 3f 9f df 25 2c 0e 09 79 9a |^..... ?..%,..y.|
00000030 c7 69 86 14 85 e9 37 99 b9 c2 8b 24 c9 da 94 4c |.i....7....$...L|
00000040 55 7f 88 f9 27 d3 29 |U...'.)|
[4832 02-22 00:15:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4833 02-22 00:15:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[4834 02-22 00:15:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:62
[4835 02-22 00:15:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:62
[4836 02-22 00:15:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[4837 02-22 00:15:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4838 02-22 00:15:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4839 02-22 00:15:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[483a 02-22 00:15:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[483b 02-22 00:15:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[483c 02-22 00:15:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[483d 02-22 00:15:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[483e 02-22 00:15:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[483f 02-22 00:15:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[4840 02-22 00:15:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4841 02-22 00:15:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:1621444041730032290 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4842 02-22 00:15:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:1621444041730032290 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4843 02-22 00:15:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1621444041730032290 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4844 02-22 00:15:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4845 02-22 00:15:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4846 02-22 00:15:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4847 02-22 00:15:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4848 02-22 00:15:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4849 02-22 00:15:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[484a 02-22 00:15:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[484b 02-22 00:15:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[484c 02-22 00:15:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:9207332970060725720 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[484d 02-22 00:15:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:9207332970060725720 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[484e 02-22 00:15:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[484f 02-22 00:15:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4850 02-22 00:15:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[4851 02-22 00:15:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:14142496937411229144 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[4852 02-22 00:15:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[4853 02-22 00:15:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17459816111130995594 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[4854 02-22 00:15:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[4855 02-22 00:15:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:15966816738955958390 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[4856 02-22 00:15:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:15966816738955958390 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4857 02-22 00:15:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4858 02-22 00:15:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:14142496937411229144 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4859 02-22 00:15:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[485a 02-22 00:15:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17459816111130995594 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[485b 02-22 00:15:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[485c 02-22 00:15:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17459816111130995594 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[485d 02-22 00:15:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17459816111130995594 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[485e 02-22 00:15:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[485f 02-22 00:15:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14142496937411229144 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 154 bytes, Signature: 0 bytes
[4860 02-22 00:15:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14142496937411229144 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 154 bytes, Signature: 0 bytes
[4861 02-22 00:15:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4862 02-22 00:15:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15966816738955958390 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[4863 02-22 00:15:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15966816738955958390 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[4864 02-22 00:15:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15966816738955958390 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[4865 02-22 00:15:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4866 02-22 00:15:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4867 02-22 00:15:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4868 02-22 00:15:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4869 02-22 00:15:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[486a 02-22 00:15:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[486b 02-22 00:15:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[486c 02-22 00:15:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[486d 02-22 00:15:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[486e 02-22 00:15:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[486f 02-22 00:15:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4870 02-22 00:15:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4871 02-22 00:15:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 27 99 80 e7 09 0e 76 d1 6c 56 6a 86 32 c9 47 |.'.....v.lVj.2.G|
00000010 b9 35 a7 e9 8b 51 b2 e3 11 b1 fd 44 fb cc c9 3b |.5...Q.....D...;|
[4872 02-22 00:15:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 13 e1 37 77 c3 8f 2d ee 6c 3f 33 |0D. ;..7w..-.l?3|
00000010 a4 9e 2a 5d aa 03 4c a9 86 9c 55 2d 24 f7 b5 fc |..*]..L...U-$...|
00000020 4e b6 22 df 02 20 18 ab 05 3d f7 0c 97 39 93 1b |N.".. ...=...9..|
00000030 9e 60 cc e9 5e 3c c2 ad f9 a8 96 c7 f4 d2 66 33 |.`..^<........f3|
00000040 ae a4 80 43 65 e9 |...Ce.|
[4873 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4874 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df01d0 gate 1582330522497615800 evaluation starts
[4875 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df01d0 signed by 0 principal evaluation starts (used [false])
[4876 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df01d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4877 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df01d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4878 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df01d0 principal evaluation fails
[4879 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df01d0 gate 1582330522497615800 evaluation fails
[487a 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[487b 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[487c 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[487d 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 27 99 80 e7 09 0e 76 d1 6c 56 6a 86 32 c9 47 |.'.....v.lVj.2.G|
00000010 b9 35 a7 e9 8b 51 b2 e3 11 b1 fd 44 fb cc c9 3b |.5...Q.....D...;|
[487e 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 13 e1 37 77 c3 8f 2d ee 6c 3f 33 |0D. ;..7w..-.l?3|
00000010 a4 9e 2a 5d aa 03 4c a9 86 9c 55 2d 24 f7 b5 fc |..*]..L...U-$...|
00000020 4e b6 22 df 02 20 18 ab 05 3d f7 0c 97 39 93 1b |N.".. ...=...9..|
00000030 9e 60 cc e9 5e 3c c2 ad f9 a8 96 c7 f4 d2 66 33 |.`..^<........f3|
00000040 ae a4 80 43 65 e9 |...Ce.|
[487f 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4880 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df0ad0 gate 1582330522498058900 evaluation starts
[4881 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df0ad0 signed by 0 principal evaluation starts (used [false])
[4882 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df0ad0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4883 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df0ad0 principal evaluation succeeds for identity 0
[4884 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df0ad0 gate 1582330522498058900 evaluation succeeds
[4885 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4886 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4887 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4888 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4889 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes
[488a 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes]}
[488b 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:61
[488c 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:61
[488d 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[488e 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[488f 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4890 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4891 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[4892 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4893 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4894 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4895 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[4896 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[4897 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[4898 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4899 02-22 00:15:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[489a 02-22 00:15:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[489b 02-22 00:15:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[489c 02-22 00:15:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[489d 02-22 00:15:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[489e 02-22 00:15:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[489f 02-22 00:15:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[48a0 02-22 00:15:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[48a1 02-22 00:15:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[48a2 02-22 00:15:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[48a3 02-22 00:15:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[48a4 02-22 00:15:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[48a5 02-22 00:15:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7a 08 5e 42 18 f9 b9 01 86 44 20 4b 12 73 80 8a |z.^B.....D K.s..|
00000010 88 50 79 bd 9b e3 d5 b0 4d c0 1b d7 28 44 a2 e8 |.Py.....M...(D..|
[48a6 02-22 00:15:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 88 d9 1e 8f 5e 44 72 e8 12 31 |0E.!......^Dr..1|
00000010 6d 29 c1 88 d9 51 38 a3 c6 61 c1 bb 43 3c d4 7d |m)...Q8..a..C<.}|
00000020 6f 55 70 7a 7c 02 20 45 a4 25 1c 42 78 f9 10 bd |oUpz|. E.%.Bx...|
00000030 52 df 33 8c 6d ac 3e f6 c1 89 2a 20 f5 e3 bf eb |R.3.m.>...* ....|
00000040 c0 e6 a8 5d 43 db 96 |...]C..|
[48a7 02-22 00:15:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[48a8 02-22 00:15:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0d5d0 gate 1582330522514004800 evaluation starts
[48a9 02-22 00:15:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0d5d0 signed by 0 principal evaluation starts (used [false])
[48aa 02-22 00:15:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0d5d0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[48ab 02-22 00:15:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0d5d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[48ac 02-22 00:15:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0d5d0 principal evaluation fails
[48ad 02-22 00:15:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0d5d0 gate 1582330522514004800 evaluation fails
[48ae 02-22 00:15:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[48af 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15103A
[48b0 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3DAA6159083AB4652F6BCC442E8A7BBC971C5CF716AEE7121A8C95BB2B9E984D
[48b1 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[48b2 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[48b3 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[48b4 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[48b5 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[48b6 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[48b7 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[48b8 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[48b9 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48ba 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[48bb 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48bc 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[48bd 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48be 02-22 00:15:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[48bf 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[48c0 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7a 08 5e 42 18 f9 b9 01 86 44 20 4b 12 73 80 8a |z.^B.....D K.s..|
00000010 88 50 79 bd 9b e3 d5 b0 4d c0 1b d7 28 44 a2 e8 |.Py.....M...(D..|
[48c1 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 88 d9 1e 8f 5e 44 72 e8 12 31 |0E.!......^Dr..1|
00000010 6d 29 c1 88 d9 51 38 a3 c6 61 c1 bb 43 3c d4 7d |m)...Q8..a..C<.}|
00000020 6f 55 70 7a 7c 02 20 45 a4 25 1c 42 78 f9 10 bd |oUpz|. E.%.Bx...|
00000030 52 df 33 8c 6d ac 3e f6 c1 89 2a 20 f5 e3 bf eb |R.3.m.>...* ....|
00000040 c0 e6 a8 5d 43 db 96 |...]C..|
[48c2 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[48c3 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0ded0 gate 1582330522578425800 evaluation starts
[48c4 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0ded0 signed by 0 principal evaluation starts (used [false])
[48c5 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0ded0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[48c6 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0ded0 principal evaluation succeeds for identity 0
[48c7 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0ded0 gate 1582330522578425800 evaluation succeeds
[48c8 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[48c9 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[48ca 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[48cb 02-22 00:15:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[48cc 02-22 00:15:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes
[48cd 02-22 00:15:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes]}
[48ce 02-22 00:15:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:59
[48cf 02-22 00:15:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:59
[48d0 02-22 00:15:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:58 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[48d1 02-22 00:15:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48d2 02-22 00:15:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48d3 02-22 00:15:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48d4 02-22 00:15:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[48d5 02-22 00:15:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[48d6 02-22 00:15:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[48d7 02-22 00:15:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[48d8 02-22 00:15:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[48d9 02-22 00:15:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[48da 02-22 00:15:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[48db 02-22 00:15:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48dc 02-22 00:15:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[48dd 02-22 00:15:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48de 02-22 00:15:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[48df 02-22 00:15:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[48e0 02-22 00:15:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d aa 61 59 08 3a b4 65 2f 6b cc 44 2e 8a 7b bc |=.aY.:.e/k.D..{.|
00000010 97 1c 5c f7 16 ae e7 12 1a 8c 95 bb 2b 9e 98 4d |..\.........+..M|
[48e1 02-22 00:15:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 5e 80 a3 0d b3 69 de 05 8c 23 6a |0D. .^....i...#j|
00000010 5d fc 94 88 5e 03 5d 39 14 97 0f 7f 81 17 89 ed |]...^.]9........|
00000020 12 d6 a6 cb 02 20 6a eb 2f 98 80 46 60 ca 21 54 |..... j./..F`.!T|
00000030 a0 98 05 e4 49 72 ce 1d d0 3d b3 9d 29 97 4e d3 |....Ir...=..).N.|
00000040 a8 d9 7f 52 26 ff |...R&.|
[48e2 02-22 00:15:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[48e3 02-22 00:15:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 7e ec 6a 71 0a b0 fd c6 46 ae |0E.!..~.jq....F.|
00000010 75 0c 58 4b e8 f9 b7 ea e2 8d 22 e3 a0 d0 8b 45 |u.XK......"....E|
00000020 c9 69 57 26 89 02 20 48 ac ec 3f 38 19 a1 54 4d |.iW&.. H..?8..TM|
00000030 56 37 8f 36 44 38 b0 79 2d af 62 ed 09 d4 c0 73 |V7.6D8.y-.b....s|
00000040 79 55 48 9a b4 18 36 |yUH...6|
[48e4 02-22 00:15:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[48e5 02-22 00:15:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[48e6 02-22 00:15:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48e7 02-22 00:15:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48e8 02-22 00:15:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[48e9 02-22 00:15:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[48ea 02-22 00:15:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48eb 02-22 00:15:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[48ec 02-22 00:15:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[48ed 02-22 00:15:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d aa 61 59 08 3a b4 65 2f 6b cc 44 2e 8a 7b bc |=.aY.:.e/k.D..{.|
00000010 97 1c 5c f7 16 ae e7 12 1a 8c 95 bb 2b 9e 98 4d |..\.........+..M|
[48ee 02-22 00:15:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 5e 80 a3 0d b3 69 de 05 8c 23 6a |0D. .^....i...#j|
00000010 5d fc 94 88 5e 03 5d 39 14 97 0f 7f 81 17 89 ed |]...^.]9........|
00000020 12 d6 a6 cb 02 20 6a eb 2f 98 80 46 60 ca 21 54 |..... j./..F`.!T|
00000030 a0 98 05 e4 49 72 ce 1d d0 3d b3 9d 29 97 4e d3 |....Ir...=..).N.|
00000040 a8 d9 7f 52 26 ff |...R&.|
[48ef 02-22 00:15:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes
[48f0 02-22 00:15:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes
[48f1 02-22 00:15:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48f2 02-22 00:15:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[48f3 02-22 00:15:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ca 33 02 da 99 74 b9 d2 33 16 35 69 4d 82 b8 18 |.3...t..3.5iM...|
00000010 1c 9a 79 72 42 c4 94 30 b4 b8 85 1a 7a 3f c4 98 |..yrB..0....z?..|
[48f4 02-22 00:15:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 c3 72 db aa 75 f1 a7 b5 aa a0 |0E.!...r..u.....|
00000010 bb 45 c7 66 8f 17 98 46 b1 3e c6 22 97 6b 2c 6a |.E.f...F.>.".k,j|
00000020 31 d5 de 4d e5 02 20 3b c8 51 b8 ff b1 47 9e eb |1..M.. ;.Q...G..|
00000030 66 24 dc 6a 41 2c 70 35 53 cb db 8b 4a aa 5d 96 |f$.jA,p5S...J.].|
00000040 dc 91 4c 3c 6d 2e 28 |..L<m.(|
[48f5 02-22 00:15:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[48f6 02-22 00:15:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48f7 02-22 00:15:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48f8 02-22 00:15:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[48f9 02-22 00:15:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[48fa 02-22 00:15:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[48fb 02-22 00:15:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[48fc 02-22 00:15:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ca 33 02 da 99 74 b9 d2 33 16 35 69 4d 82 b8 18 |.3...t..3.5iM...|
00000010 1c 9a 79 72 42 c4 94 30 b4 b8 85 1a 7a 3f c4 98 |..yrB..0....z?..|
[48fd 02-22 00:15:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 c3 72 db aa 75 f1 a7 b5 aa a0 |0E.!...r..u.....|
00000010 bb 45 c7 66 8f 17 98 46 b1 3e c6 22 97 6b 2c 6a |.E.f...F.>.".k,j|
00000020 31 d5 de 4d e5 02 20 3b c8 51 b8 ff b1 47 9e eb |1..M.. ;.Q...G..|
00000030 66 24 dc 6a 41 2c 70 35 53 cb db 8b 4a aa 5d 96 |f$.jA,p5S...J.].|
00000040 dc 91 4c 3c 6d 2e 28 |..L<m.(|
[48fe 02-22 00:15:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[48ff 02-22 00:15:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4900 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[4901 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4902 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4903 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4904 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4905 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4906 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4907 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4908 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 27 99 80 e7 09 0e 76 d1 6c 56 6a 86 32 c9 47 |.'.....v.lVj.2.G|
00000010 b9 35 a7 e9 8b 51 b2 e3 11 b1 fd 44 fb cc c9 3b |.5...Q.....D...;|
[4909 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 13 e1 37 77 c3 8f 2d ee 6c 3f 33 |0D. ;..7w..-.l?3|
00000010 a4 9e 2a 5d aa 03 4c a9 86 9c 55 2d 24 f7 b5 fc |..*]..L...U-$...|
00000020 4e b6 22 df 02 20 18 ab 05 3d f7 0c 97 39 93 1b |N.".. ...=...9..|
00000030 9e 60 cc e9 5e 3c c2 ad f9 a8 96 c7 f4 d2 66 33 |.`..^<........f3|
00000040 ae a4 80 43 65 e9 |...Ce.|
[490a 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[490b 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7c630 gate 1582330522676403400 evaluation starts
[490c 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7c630 signed by 0 principal evaluation starts (used [false])
[490d 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7c630 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[490e 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7c630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[490f 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7c630 principal evaluation fails
[4910 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7c630 gate 1582330522676403400 evaluation fails
[4911 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4912 02-22 00:15:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4913 02-22 00:15:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4914 02-22 00:15:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 27 99 80 e7 09 0e 76 d1 6c 56 6a 86 32 c9 47 |.'.....v.lVj.2.G|
00000010 b9 35 a7 e9 8b 51 b2 e3 11 b1 fd 44 fb cc c9 3b |.5...Q.....D...;|
[4915 02-22 00:15:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 13 e1 37 77 c3 8f 2d ee 6c 3f 33 |0D. ;..7w..-.l?3|
00000010 a4 9e 2a 5d aa 03 4c a9 86 9c 55 2d 24 f7 b5 fc |..*]..L...U-$...|
00000020 4e b6 22 df 02 20 18 ab 05 3d f7 0c 97 39 93 1b |N.".. ...=...9..|
00000030 9e 60 cc e9 5e 3c c2 ad f9 a8 96 c7 f4 d2 66 33 |.`..^<........f3|
00000040 ae a4 80 43 65 e9 |...Ce.|
[4916 02-22 00:15:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4917 02-22 00:15:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7cf30 gate 1582330522683016400 evaluation starts
[4918 02-22 00:15:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7cf30 signed by 0 principal evaluation starts (used [false])
[4919 02-22 00:15:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7cf30 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[491a 02-22 00:15:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7cf30 principal evaluation succeeds for identity 0
[491b 02-22 00:15:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7cf30 gate 1582330522683016400 evaluation succeeds
[491c 02-22 00:15:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[491d 02-22 00:15:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[491e 02-22 00:15:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[491f 02-22 00:15:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4920 02-22 00:15:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes
[4921 02-22 00:15:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4922 02-22 00:15:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[4923 02-22 00:15:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d aa 61 59 08 3a b4 65 2f 6b cc 44 2e 8a 7b bc |=.aY.:.e/k.D..{.|
00000010 97 1c 5c f7 16 ae e7 12 1a 8c 95 bb 2b 9e 98 4d |..\.........+..M|
[4924 02-22 00:15:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 5e 80 a3 0d b3 69 de 05 8c 23 6a |0D. .^....i...#j|
00000010 5d fc 94 88 5e 03 5d 39 14 97 0f 7f 81 17 89 ed |]...^.]9........|
00000020 12 d6 a6 cb 02 20 6a eb 2f 98 80 46 60 ca 21 54 |..... j./..F`.!T|
00000030 a0 98 05 e4 49 72 ce 1d d0 3d b3 9d 29 97 4e d3 |....Ir...=..).N.|
00000040 a8 d9 7f 52 26 ff |...R&.|
[4925 02-22 00:15:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes
[4926 02-22 00:15:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes
[4927 02-22 00:15:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4928 02-22 00:15:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4929 02-22 00:15:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[492a 02-22 00:15:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[492b 02-22 00:15:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[492c 02-22 00:15:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[492d 02-22 00:15:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[492e 02-22 00:15:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[492f 02-22 00:15:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[4930 02-22 00:15:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4931 02-22 00:15:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4932 02-22 00:15:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4933 02-22 00:15:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4934 02-22 00:15:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[4935 02-22 00:15:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[4936 02-22 00:15:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[4937 02-22 00:15:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[4938 02-22 00:15:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4939 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[493a 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[493b 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[493c 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[493d 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[493e 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[493f 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4940 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4941 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4942 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4943 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9590 gate 1582330523054562400 evaluation starts
[4944 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9590 signed by 0 principal evaluation starts (used [false])
[4945 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9590 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4946 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4947 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9590 principal evaluation fails
[4948 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9590 gate 1582330523054562400 evaluation fails
[4949 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[494a 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[494b 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[494c 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[494d 02-22 00:15:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[494e 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[494f 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9e90 gate 1582330523060924000 evaluation starts
[4950 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9e90 signed by 0 principal evaluation starts (used [false])
[4951 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9e90 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4952 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9e90 principal evaluation succeeds for identity 0
[4953 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9e90 gate 1582330523060924000 evaluation succeeds
[4954 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4955 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4956 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4957 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4958 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4959 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[495a 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[495b 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[495c 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[495d 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[495e 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[495f 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4960 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4961 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4962 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4963 02-22 00:15:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebf8f0 gate 1582330523069693800 evaluation starts
[4964 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebf8f0 signed by 0 principal evaluation starts (used [false])
[4965 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebf8f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4966 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebf8f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4967 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebf8f0 principal evaluation fails
[4968 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebf8f0 gate 1582330523069693800 evaluation fails
[4969 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[496a 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[496b 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[496c 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[496d 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[496e 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[496f 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed61f0 gate 1582330523072660500 evaluation starts
[4970 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed61f0 signed by 0 principal evaluation starts (used [false])
[4971 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed61f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4972 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed61f0 principal evaluation succeeds for identity 0
[4973 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed61f0 gate 1582330523072660500 evaluation succeeds
[4974 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4975 02-22 00:15:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4976 02-22 00:15:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4977 02-22 00:15:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4978 02-22 00:15:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4979 02-22 00:15:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[497a 02-22 00:15:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[497b 02-22 00:15:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[497c 02-22 00:15:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[497d 02-22 00:15:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[497e 02-22 00:15:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[497f 02-22 00:15:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4980 02-22 00:15:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4981 02-22 00:15:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4982 02-22 00:15:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4983 02-22 00:15:23.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4984 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4985 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4986 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7f00 gate 1582330523110684300 evaluation starts
[4987 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7f00 signed by 0 principal evaluation starts (used [false])
[4988 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7f00 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4989 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7f00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[498a 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7f00 principal evaluation fails
[498b 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7f00 gate 1582330523110684300 evaluation fails
[498c 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[498d 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[498e 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[498f 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4990 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4991 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4992 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef2800 gate 1582330523114345800 evaluation starts
[4993 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef2800 signed by 0 principal evaluation starts (used [false])
[4994 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef2800 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4995 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef2800 principal evaluation succeeds for identity 0
[4996 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef2800 gate 1582330523114345800 evaluation succeeds
[4997 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4998 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4999 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[499a 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[499b 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[499c 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[499d 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[499e 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[499f 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49a0 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49a1 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[49a2 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[49a3 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[49a4 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[49a5 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[49a6 02-22 00:15:23.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[49a7 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[49a8 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[49a9 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[49aa 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f08fc0 gate 1582330523125485700 evaluation starts
[49ab 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f08fc0 signed by 0 principal evaluation starts (used [false])
[49ac 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f08fc0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[49ad 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f08fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[49ae 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f08fc0 principal evaluation fails
[49af 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f08fc0 gate 1582330523125485700 evaluation fails
[49b0 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[49b1 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[49b2 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[49b3 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[49b4 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[49b5 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[49b6 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f098c0 gate 1582330523127587900 evaluation starts
[49b7 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f098c0 signed by 0 principal evaluation starts (used [false])
[49b8 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f098c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[49b9 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f098c0 principal evaluation succeeds for identity 0
[49ba 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f098c0 gate 1582330523127587900 evaluation succeeds
[49bb 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[49bc 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[49bd 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[49be 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[49bf 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[49c0 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[49c1 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49c2 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49c3 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49c4 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[49c5 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[49c6 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[49c7 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[49c8 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[49c9 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[49ca 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[49cb 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[49cc 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[49cd 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f195d0 gate 1582330523128488000 evaluation starts
[49ce 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f195d0 signed by 0 principal evaluation starts (used [false])
[49cf 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f195d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[49d0 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f195d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[49d1 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f195d0 principal evaluation fails
[49d2 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f195d0 gate 1582330523128488000 evaluation fails
[49d3 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[49d4 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[49d5 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[49d6 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[49d7 02-22 00:15:23.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[49d8 02-22 00:15:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[49d9 02-22 00:15:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f19ed0 gate 1582330523135749900 evaluation starts
[49da 02-22 00:15:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f19ed0 signed by 0 principal evaluation starts (used [false])
[49db 02-22 00:15:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f19ed0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[49dc 02-22 00:15:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f19ed0 principal evaluation succeeds for identity 0
[49dd 02-22 00:15:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f19ed0 gate 1582330523135749900 evaluation succeeds
[49de 02-22 00:15:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[49df 02-22 00:15:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[49e0 02-22 00:15:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[49e1 02-22 00:15:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[49e2 02-22 00:15:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[49e3 02-22 00:15:23.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[49e4 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49e5 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[49e6 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[49e7 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[49e8 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[49e9 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[49ea 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[49eb 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[49ec 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[49ed 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[49ee 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[49ef 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f37fe0 gate 1582330523146546800 evaluation starts
[49f0 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f37fe0 signed by 0 principal evaluation starts (used [false])
[49f1 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f37fe0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[49f2 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f37fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[49f3 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f37fe0 principal evaluation fails
[49f4 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f37fe0 gate 1582330523146546800 evaluation fails
[49f5 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[49f6 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[49f7 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[49f8 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[49f9 02-22 00:15:23.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[49fa 02-22 00:15:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[49fb 02-22 00:15:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4a8e0 gate 1582330523150569800 evaluation starts
[49fc 02-22 00:15:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4a8e0 signed by 0 principal evaluation starts (used [false])
[49fd 02-22 00:15:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4a8e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[49fe 02-22 00:15:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4a8e0 principal evaluation succeeds for identity 0
[49ff 02-22 00:15:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4a8e0 gate 1582330523150569800 evaluation succeeds
[4a00 02-22 00:15:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4a01 02-22 00:15:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4a02 02-22 00:15:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4a03 02-22 00:15:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4a04 02-22 00:15:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[4a05 02-22 00:15:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[4a06 02-22 00:15:23.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a07 02-22 00:15:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a08 02-22 00:15:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a09 02-22 00:15:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[4a0a 02-22 00:15:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a0b 02-22 00:15:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a0c 02-22 00:15:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:17507050591983716215 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[4a0d 02-22 00:15:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:17507050591983716215 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[4a0e 02-22 00:15:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a0f 02-22 00:15:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17507050591983716215 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[4a10 02-22 00:15:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17507050591983716215 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[4a11 02-22 00:15:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a12 02-22 00:15:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[4a13 02-22 00:15:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a14 02-22 00:15:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a15 02-22 00:15:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a16 02-22 00:15:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6746759402171257968 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[4a17 02-22 00:15:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6746759402171257968 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[4a18 02-22 00:15:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[4a19 02-22 00:15:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a1a 02-22 00:15:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[4a1b 02-22 00:15:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a1c 02-22 00:15:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a1d 02-22 00:15:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a1e 02-22 00:15:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a1f 02-22 00:15:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[4a20 02-22 00:15:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[4a21 02-22 00:15:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a22 02-22 00:15:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a23 02-22 00:15:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a24 02-22 00:15:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a25 02-22 00:15:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4a26 02-22 00:15:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a27 02-22 00:15:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4a28 02-22 00:15:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[4a29 02-22 00:15:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a b4 8c ec 68 33 9e 53 b1 57 4d 49 9f 50 18 1a |:...h3.S.WMI.P..|
00000010 bb 81 99 ae fc 25 74 ad dc 3e 27 c5 75 77 a0 ca |.....%t..>'.uw..|
[4a2a 02-22 00:15:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 c9 4a 66 bb bc 0d 5e 67 4d 9d 46 |0D. 6.Jf...^gM.F|
00000010 7f 3e 43 98 a6 25 95 be 15 81 ab c7 be 09 68 9c |.>C..%........h.|
00000020 e3 3a da a6 02 20 48 df 97 06 f2 d3 32 37 44 d3 |.:... H.....27D.|
00000030 aa fc 94 e7 3a 93 c6 d1 3c f8 ba c6 12 66 b6 e7 |....:...<....f..|
00000040 e4 f3 a2 8f cd af |......|
[4a2b 02-22 00:15:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[4a2c 02-22 00:15:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 c6 9e f1 77 4a d3 31 9a 08 fe |0E.!.....wJ.1...|
00000010 0e 7c 5b 2c 2a a9 cf ae c9 a0 e2 a2 41 ca 92 9f |.|[,*.......A...|
00000020 5e 84 c2 2e 18 02 20 29 3d 8a 7c 4c 6b 5c d0 6b |^..... )=.|Lk\.k|
00000030 b8 66 22 f6 e2 d3 15 44 3e f1 96 7a cb c2 ba 84 |.f"....D>..z....|
00000040 1d 50 8b 1c a8 dc 7d |.P....}|
[4a2d 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4a2e 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[4a2f 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:63
[4a30 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:63
[4a31 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[4a32 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a33 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a34 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a35 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a36 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a37 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a38 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[4a39 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a3a 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes
[4a3c 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a3b 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[4a3d 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes
[4a3e 02-22 00:15:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a3f 02-22 00:15:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes
[4a40 02-22 00:15:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a41 02-22 00:15:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes
[4a42 02-22 00:15:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a43 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a44 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a45 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a46 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a47 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[4a48 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a49 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4a4a 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4a4b 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4a4c 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4a4d 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4a4e 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4a4f 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e a7 19 22 15 c2 07 51 fc dc 4c 3a b1 03 53 a1 |..."...Q..L:..S.|
00000010 5c 1e 5f 7c a5 b8 29 00 19 8c e5 e7 a0 f5 f7 e6 |\._|..).........|
[4a50 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 c0 a8 41 ca 60 f1 77 1b 8d b4 |0E.!....A.`.w...|
00000010 d6 84 de 16 05 61 54 74 1f 33 11 da a8 94 9c 04 |.....aTt.3......|
00000020 fc 13 54 c3 41 02 20 08 e8 5d 62 8b b6 d3 ba 05 |..T.A. ..]b.....|
00000030 74 55 ca d6 11 08 72 2b 43 99 b5 1e 19 58 59 b6 |tU....r+C....XY.|
00000040 15 23 da a5 ea 34 93 |.#...4.|
[4a51 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4a52 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fb2eb0 gate 1582330524319478000 evaluation starts
[4a53 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fb2eb0 signed by 0 principal evaluation starts (used [false])
[4a54 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fb2eb0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4a55 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fb2eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4a56 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fb2eb0 principal evaluation fails
[4a57 02-22 00:15:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fb2eb0 gate 1582330524319478000 evaluation fails
[4a58 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4a59 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4a5a 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4a5b 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e a7 19 22 15 c2 07 51 fc dc 4c 3a b1 03 53 a1 |..."...Q..L:..S.|
00000010 5c 1e 5f 7c a5 b8 29 00 19 8c e5 e7 a0 f5 f7 e6 |\._|..).........|
[4a5c 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 c0 a8 41 ca 60 f1 77 1b 8d b4 |0E.!....A.`.w...|
00000010 d6 84 de 16 05 61 54 74 1f 33 11 da a8 94 9c 04 |.....aTt.3......|
00000020 fc 13 54 c3 41 02 20 08 e8 5d 62 8b b6 d3 ba 05 |..T.A. ..]b.....|
00000030 74 55 ca d6 11 08 72 2b 43 99 b5 1e 19 58 59 b6 |tU....r+C....XY.|
00000040 15 23 da a5 ea 34 93 |.#...4.|
[4a5d 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4a5e 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fb37b0 gate 1582330524322060200 evaluation starts
[4a5f 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fb37b0 signed by 0 principal evaluation starts (used [false])
[4a60 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fb37b0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4a61 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fb37b0 principal evaluation succeeds for identity 0
[4a62 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fb37b0 gate 1582330524322060200 evaluation succeeds
[4a63 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes
[4a64 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes
[4a65 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4a66 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4a67 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4a68 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4a69 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a6a 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes]}
[4a6b 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:62
[4a6c 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:62
[4a6d 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[4a6e 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a6f 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a70 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a71 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes
[4a72 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a73 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a74 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a75 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a76 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a77 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a78 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a79 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a7a 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a7b 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4a7c 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a7d 02-22 00:15:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4a7e 02-22 00:15:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a7f 02-22 00:15:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a80 02-22 00:15:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a81 02-22 00:15:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a82 02-22 00:15:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a83 02-22 00:15:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a84 02-22 00:15:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a85 02-22 00:15:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a86 02-22 00:15:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a87 02-22 00:15:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a88 02-22 00:15:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4a89 02-22 00:15:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a8a 02-22 00:15:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[4a8b 02-22 00:15:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[4a8c 02-22 00:15:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510151801
[4a8d 02-22 00:15:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D007C0194FA72F212DB9BE81F78A1B0E8C548572AD789643378202D6B350CF14
[4a8e 02-22 00:15:24.36 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[4a8f 02-22 00:15:24.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a90 02-22 00:15:24.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a91 02-22 00:15:24.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a92 02-22 00:15:24.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a93 02-22 00:15:24.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:21 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[4a94 02-22 00:15:24.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a95 02-22 00:15:24.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a96 02-22 00:15:24.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:21 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[4a97 02-22 00:15:24.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a98 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4a99 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4a9a 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4a9b 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[4a9c 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4a9d 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4a9e 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4a9f 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4aa0 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4aa1 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4aa2 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4aa3 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 39 6d 2b 24 71 7e 30 e4 de 80 e1 7a a2 29 21 |.9m+$q~0....z.)!|
00000010 6a a8 d3 a6 8c b1 66 f2 c0 07 34 20 4f cb ce 4e |j.....f...4 O..N|
[4aa4 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 f1 87 67 05 54 2e 46 8c f1 ec d0 |0D. p..g.T.F....|
00000010 06 04 8b 7c 33 ca 13 4c 27 a7 3c a2 cf 39 40 2c |...|3..L'.<..9@,|
00000020 57 67 16 7b 02 20 09 8a 15 83 c9 88 1c 1b 5e 30 |Wg.{. ........^0|
00000030 36 e8 8d a1 d9 9a 05 70 13 c0 0f 23 19 39 5b 35 |6......p...#.9[5|
00000040 04 a9 ff aa 95 98 |......|
[4aa5 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4aa6 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004002a50 gate 1582330524387580800 evaluation starts
[4aa7 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004002a50 signed by 0 principal evaluation starts (used [false])
[4aa8 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004002a50 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4aa9 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004002a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4aaa 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004002a50 principal evaluation fails
[4aab 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004002a50 gate 1582330524387580800 evaluation fails
[4aac 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4aad 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4aae 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4aaf 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 39 6d 2b 24 71 7e 30 e4 de 80 e1 7a a2 29 21 |.9m+$q~0....z.)!|
00000010 6a a8 d3 a6 8c b1 66 f2 c0 07 34 20 4f cb ce 4e |j.....f...4 O..N|
[4ab0 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 f1 87 67 05 54 2e 46 8c f1 ec d0 |0D. p..g.T.F....|
00000010 06 04 8b 7c 33 ca 13 4c 27 a7 3c a2 cf 39 40 2c |...|3..L'.<..9@,|
00000020 57 67 16 7b 02 20 09 8a 15 83 c9 88 1c 1b 5e 30 |Wg.{. ........^0|
00000030 36 e8 8d a1 d9 9a 05 70 13 c0 0f 23 19 39 5b 35 |6......p...#.9[5|
00000040 04 a9 ff aa 95 98 |......|
[4ab1 02-22 00:15:24.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4ab2 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004003350 gate 1582330524390207800 evaluation starts
[4ab3 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004003350 signed by 0 principal evaluation starts (used [false])
[4ab4 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004003350 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4ab5 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004003350 principal evaluation succeeds for identity 0
[4ab6 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004003350 gate 1582330524390207800 evaluation succeeds
[4ab7 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4ab8 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4ab9 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4aba 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4abb 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4abc 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes]}
[4abd 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:60
[4abe 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:60
[4abf 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[4ac0 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ac1 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ac2 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ac3 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ac4 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ac5 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ac6 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ac7 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ac8 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ac9 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4aca 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[4acb 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4acc 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[4ace 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4acf 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4acd 02-22 00:15:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4ad0 02-22 00:15:24.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ad1 02-22 00:15:24.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4ad2 02-22 00:15:24.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ad3 02-22 00:15:24.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4ad4 02-22 00:15:24.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ad5 02-22 00:15:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4ad6 02-22 00:15:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4ad7 02-22 00:15:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ad8 02-22 00:15:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4ad9 02-22 00:15:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ada 02-22 00:15:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15103B
[4adb 02-22 00:15:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 98437DDBFACC50F093D58F9E167455150EF575014EF3C68ACF8A364348159E65
[4adc 02-22 00:15:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[4add 02-22 00:15:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[4ade 02-22 00:15:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[4adf 02-22 00:15:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ae0 02-22 00:15:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ae1 02-22 00:15:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ae2 02-22 00:15:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4ae3 02-22 00:15:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[4ae4 02-22 00:15:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ae6 02-22 00:15:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4ae8 02-22 00:15:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes
[4ae5 02-22 00:15:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes
[4aea 02-22 00:15:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ae9 02-22 00:15:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ae7 02-22 00:15:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4aeb 02-22 00:15:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4aec 02-22 00:15:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:14502307131963067693 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4aed 02-22 00:15:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:14502307131963067693 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4aee 02-22 00:15:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4aef 02-22 00:15:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4af0 02-22 00:15:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4af1 02-22 00:15:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4af2 02-22 00:15:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4af3 02-22 00:15:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4af4 02-22 00:15:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[4af5 02-22 00:15:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4af6 02-22 00:15:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[4af7 02-22 00:15:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4af8 02-22 00:15:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[4af9 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[4afa 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 63 66 4d 0d 56 07 59 fd ac 8b f2 cf b0 be cb |.cfM.V.Y........|
00000010 06 ef ad 16 3c b8 5c fa eb a1 d5 82 81 84 89 74 |....<.\........t|
[4afb 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a a7 5c b1 36 94 14 93 ff cb db ed |0D. z.\.6.......|
00000010 10 2d 9f 87 7f a3 7a 7c e8 73 23 4d f1 ca b6 21 |.-....z|.s#M...!|
00000020 98 67 dd 58 02 20 06 87 90 5e ae 45 0e de 4e ef |.g.X. ...^.E..N.|
00000030 b5 e9 c4 cf e1 5b a6 49 cf 70 a1 3b 24 2e e8 e1 |.....[.I.p.;$...|
00000040 82 47 77 f4 e6 27 |.Gw..'|
[4afc 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[4afd 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 14 f4 e0 d2 1a 1d 96 ce 98 72 |0E.!...........r|
00000010 a4 ee 09 fb 7f 95 9b 25 a7 fd 65 ef ab 35 1f e9 |.......%..e..5..|
00000020 c7 57 a5 a4 18 02 20 3b 8c 7b d9 5d 11 e0 56 3f |.W.... ;.{.]..V?|
00000030 87 eb 06 26 44 c9 75 fa fc a5 f1 8b e0 58 d1 9c |...&D.u......X..|
00000040 24 94 56 c5 70 70 2a |$.V.pp*|
[4afe 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4aff 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[4b00 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:64
[4b01 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:64
[4b02 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[4b03 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b04 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b05 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b06 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[4b07 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b08 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b09 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[4b0a 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[4b0b 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[4b0c 02-22 00:15:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b0d 02-22 00:15:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:3234993852564112313 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4b0e 02-22 00:15:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:3234993852564112313 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4b0f 02-22 00:15:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:3234993852564112313 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4b10 02-22 00:15:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b11 02-22 00:15:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b12 02-22 00:15:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b13 02-22 00:15:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b14 02-22 00:15:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b15 02-22 00:15:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b16 02-22 00:15:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[4b17 02-22 00:15:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b18 02-22 00:15:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:14504092495270422839 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4b19 02-22 00:15:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:14504092495270422839 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4b1a 02-22 00:15:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[4b1b 02-22 00:15:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b1c 02-22 00:15:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[4b1d 02-22 00:15:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:6444589388000739925 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[4b1e 02-22 00:15:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[4b1f 02-22 00:15:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:6444589388000739925 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4b20 02-22 00:15:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b21 02-22 00:15:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5480514225147439535 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[4b22 02-22 00:15:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[4b23 02-22 00:15:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5480514225147439535 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4b24 02-22 00:15:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b25 02-22 00:15:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2433912099935557860 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[4b26 02-22 00:15:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2433912099935557860 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4b28 02-22 00:15:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b27 02-22 00:15:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5480514225147439535 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[4b29 02-22 00:15:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5480514225147439535 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[4b2a 02-22 00:15:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5480514225147439535 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[4b2b 02-22 00:15:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b2c 02-22 00:15:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6444589388000739925 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[4b2d 02-22 00:15:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6444589388000739925 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[4b2e 02-22 00:15:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b2f 02-22 00:15:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2433912099935557860 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[4b30 02-22 00:15:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2433912099935557860 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[4b31 02-22 00:15:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b32 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4b33 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4b34 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b35 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4b36 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[4b37 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b38 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4b39 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4b3a 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4b3b 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4b3c 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4b3d 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4b3e 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f db b0 70 db 1e 71 77 89 13 e8 a6 d6 f9 a3 c2 |...p..qw........|
00000010 ab 50 db 5f 3a 61 fb 86 8a 6c cc 7f 38 43 c7 ad |.P._:a...l..8C..|
[4b3f 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 91 86 fe 82 bc 6c 6c 2c 81 1b |0E.!.......ll,..|
00000010 fb 27 12 ca c8 ae 74 5b de 6b cb c2 ca d3 1f e3 |.'....t[.k......|
00000020 e1 b3 14 5f 40 02 20 2a 07 6f 69 2f ba 63 1c a1 |..._@. *.oi/.c..|
00000030 86 69 b9 6b f6 4a b1 cd 5c a0 ab 80 df 91 46 8b |.i.k.J..\.....F.|
00000040 db 76 f0 06 35 7f a6 |.v..5..|
[4b40 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4b41 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084840 gate 1582330526484701600 evaluation starts
[4b42 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084840 signed by 0 principal evaluation starts (used [false])
[4b43 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084840 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4b44 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4b45 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084840 principal evaluation fails
[4b46 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084840 gate 1582330526484701600 evaluation fails
[4b47 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4b48 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4b49 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4b4a 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f db b0 70 db 1e 71 77 89 13 e8 a6 d6 f9 a3 c2 |...p..qw........|
00000010 ab 50 db 5f 3a 61 fb 86 8a 6c cc 7f 38 43 c7 ad |.P._:a...l..8C..|
[4b4b 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 91 86 fe 82 bc 6c 6c 2c 81 1b |0E.!.......ll,..|
00000010 fb 27 12 ca c8 ae 74 5b de 6b cb c2 ca d3 1f e3 |.'....t[.k......|
00000020 e1 b3 14 5f 40 02 20 2a 07 6f 69 2f ba 63 1c a1 |..._@. *.oi/.c..|
00000030 86 69 b9 6b f6 4a b1 cd 5c a0 ab 80 df 91 46 8b |.i.k.J..\.....F.|
00000040 db 76 f0 06 35 7f a6 |.v..5..|
[4b4c 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4b4d 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004085140 gate 1582330526485230100 evaluation starts
[4b4e 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004085140 signed by 0 principal evaluation starts (used [false])
[4b4f 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004085140 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4b50 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004085140 principal evaluation succeeds for identity 0
[4b51 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004085140 gate 1582330526485230100 evaluation succeeds
[4b52 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4b53 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4b54 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4b55 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4b56 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes
[4b57 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes]}
[4b58 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:63
[4b59 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:63
[4b5a 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[4b5b 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b5c 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b5d 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b5e 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[4b5f 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b60 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b61 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b62 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[4b63 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[4b64 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[4b65 02-22 00:15:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b66 02-22 00:15:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15103C
[4b67 02-22 00:15:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 82E34AA0A2791B0616D1AFB0E686FF8410F8F4AA009B6C42CEDE106EACB2F840
[4b68 02-22 00:15:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[4b69 02-22 00:15:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[4b6a 02-22 00:15:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b6b 02-22 00:15:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[4b6c 02-22 00:15:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b6d 02-22 00:15:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[4b6e 02-22 00:15:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[4b6f 02-22 00:15:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[4b70 02-22 00:15:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b71 02-22 00:15:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4b72 02-22 00:15:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b73 02-22 00:15:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4b74 02-22 00:15:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b75 02-22 00:15:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[4b76 02-22 00:15:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b77 02-22 00:15:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[4b78 02-22 00:15:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[4b79 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 e3 4a a0 a2 79 1b 06 16 d1 af b0 e6 86 ff 84 |..J..y..........|
00000010 10 f8 f4 aa 00 9b 6c 42 ce de 10 6e ac b2 f8 40 |......lB...n...@|
[4b7a 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6e b1 b5 8e 57 73 f1 b0 1f e6 04 29 |0D. n...Ws.....)|
00000010 8b 72 4c dd 41 c9 8f 07 32 a9 22 7d 90 18 61 e3 |.rL.A...2."}..a.|
00000020 e9 b3 85 89 02 20 70 d5 92 af c8 79 61 89 14 ce |..... p....ya...|
00000030 71 dd e3 2b e2 b2 16 fb f4 1d 25 99 e2 94 4c b3 |q..+......%...L.|
00000040 82 8e 6f 62 d7 9d |..ob..|
[4b7b 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4b7c 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4b7d 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b7e 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[4b7f 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 63 66 4d 0d 56 07 59 fd ac 8b f2 cf b0 be cb |.cfM.V.Y........|
00000010 06 ef ad 16 3c b8 5c fa eb a1 d5 82 81 84 89 74 |....<.\........t|
[4b80 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[4b81 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a a7 5c b1 36 94 14 93 ff cb db ed |0D. z.\.6.......|
00000010 10 2d 9f 87 7f a3 7a 7c e8 73 23 4d f1 ca b6 21 |.-....z|.s#M...!|
00000020 98 67 dd 58 02 20 06 87 90 5e ae 45 0e de 4e ef |.g.X. ...^.E..N.|
00000030 b5 e9 c4 cf e1 5b a6 49 cf 70 a1 3b 24 2e e8 e1 |.....[.I.p.;$...|
00000040 82 47 77 f4 e6 27 |.Gw..'|
[4b82 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes
[4b83 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4b84 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[4b85 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4b86 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4b87 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4b88 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4b89 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4b8a 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4b8b 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4b8c 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f db b0 70 db 1e 71 77 89 13 e8 a6 d6 f9 a3 c2 |...p..qw........|
00000010 ab 50 db 5f 3a 61 fb 86 8a 6c cc 7f 38 43 c7 ad |.P._:a...l..8C..|
[4b8d 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[4b8e 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 91 86 fe 82 bc 6c 6c 2c 81 1b |0E.!.......ll,..|
00000010 fb 27 12 ca c8 ae 74 5b de 6b cb c2 ca d3 1f e3 |.'....t[.k......|
00000020 e1 b3 14 5f 40 02 20 2a 07 6f 69 2f ba 63 1c a1 |..._@. *.oi/.c..|
00000030 86 69 b9 6b f6 4a b1 cd 5c a0 ab 80 df 91 46 8b |.i.k.J..\.....F.|
00000040 db 76 f0 06 35 7f a6 |.v..5..|
[4b8f 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4b90 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c91c0 gate 1582330526596053000 evaluation starts
[4b91 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c91c0 signed by 0 principal evaluation starts (used [false])
[4b92 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c91c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4b93 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c91c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4b94 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c91c0 principal evaluation fails
[4b95 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c91c0 gate 1582330526596053000 evaluation fails
[4b96 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4b97 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4b98 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4b99 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f db b0 70 db 1e 71 77 89 13 e8 a6 d6 f9 a3 c2 |...p..qw........|
00000010 ab 50 db 5f 3a 61 fb 86 8a 6c cc 7f 38 43 c7 ad |.P._:a...l..8C..|
[4b9a 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 91 86 fe 82 bc 6c 6c 2c 81 1b |0E.!.......ll,..|
00000010 fb 27 12 ca c8 ae 74 5b de 6b cb c2 ca d3 1f e3 |.'....t[.k......|
00000020 e1 b3 14 5f 40 02 20 2a 07 6f 69 2f ba 63 1c a1 |..._@. *.oi/.c..|
00000030 86 69 b9 6b f6 4a b1 cd 5c a0 ab 80 df 91 46 8b |.i.k.J..\.....F.|
00000040 db 76 f0 06 35 7f a6 |.v..5..|
[4b9b 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4b9c 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c9ac0 gate 1582330526597466300 evaluation starts
[4b9d 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c9ac0 signed by 0 principal evaluation starts (used [false])
[4b9e 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c9ac0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4b9f 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c9ac0 principal evaluation succeeds for identity 0
[4ba0 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c9ac0 gate 1582330526597466300 evaluation succeeds
[4ba1 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4ba2 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4ba3 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4ba4 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4ba5 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes
[4ba6 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ba7 02-22 00:15:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ba8 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[4ba9 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[4baa 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 e3 4a a0 a2 79 1b 06 16 d1 af b0 e6 86 ff 84 |..J..y..........|
00000010 10 f8 f4 aa 00 9b 6c 42 ce de 10 6e ac b2 f8 40 |......lB...n...@|
[4bab 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6e b1 b5 8e 57 73 f1 b0 1f e6 04 29 |0D. n...Ws.....)|
00000010 8b 72 4c dd 41 c9 8f 07 32 a9 22 7d 90 18 61 e3 |.rL.A...2."}..a.|
00000020 e9 b3 85 89 02 20 70 d5 92 af c8 79 61 89 14 ce |..... p....ya...|
00000030 71 dd e3 2b e2 b2 16 fb f4 1d 25 99 e2 94 4c b3 |q..+......%...L.|
00000040 82 8e 6f 62 d7 9d |..ob..|
[4bac 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[4bad 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 9f df 7e 59 7f 58 08 8d cd 11 3e |0D. y..~Y.X....>|
00000010 8a 77 dc 18 9b 74 93 23 18 60 fd 3f 37 36 1a 60 |.w...t.#.`.?76.`|
00000020 6b 6e df 32 02 20 49 8d a7 28 82 c5 a2 0b 52 a9 |kn.2. I..(....R.|
00000030 b6 94 8b 85 2f 6d 9a a6 9b 1f 8d 8a c2 d8 01 da |..../m..........|
00000040 7c cf 84 75 af ff ||..u..|
[4bae 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4baf 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4bb0 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4bb1 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4bb2 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4bb3 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[4bb4 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4bb5 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[4bb6 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[4bb7 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 e3 4a a0 a2 79 1b 06 16 d1 af b0 e6 86 ff 84 |..J..y..........|
00000010 10 f8 f4 aa 00 9b 6c 42 ce de 10 6e ac b2 f8 40 |......lB...n...@|
[4bb8 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6e b1 b5 8e 57 73 f1 b0 1f e6 04 29 |0D. n...Ws.....)|
00000010 8b 72 4c dd 41 c9 8f 07 32 a9 22 7d 90 18 61 e3 |.rL.A...2."}..a.|
00000020 e9 b3 85 89 02 20 70 d5 92 af c8 79 61 89 14 ce |..... p....ya...|
00000030 71 dd e3 2b e2 b2 16 fb f4 1d 25 99 e2 94 4c b3 |q..+......%...L.|
00000040 82 8e 6f 62 d7 9d |..ob..|
[4bb9 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4bba 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes
[4bbb 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4bbc 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[4bbd 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 63 66 4d 0d 56 07 59 fd ac 8b f2 cf b0 be cb |.cfM.V.Y........|
00000010 06 ef ad 16 3c b8 5c fa eb a1 d5 82 81 84 89 74 |....<.\........t|
[4bbe 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a a7 5c b1 36 94 14 93 ff cb db ed |0D. z.\.6.......|
00000010 10 2d 9f 87 7f a3 7a 7c e8 73 23 4d f1 ca b6 21 |.-....z|.s#M...!|
00000020 98 67 dd 58 02 20 06 87 90 5e ae 45 0e de 4e ef |.g.X. ...^.E..N.|
00000030 b5 e9 c4 cf e1 5b a6 49 cf 70 a1 3b 24 2e e8 e1 |.....[.I.p.;$...|
00000040 82 47 77 f4 e6 27 |.Gw..'|
[4bbf 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes
[4bc0 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4bc1 02-22 00:15:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4bc2 02-22 00:15:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4bc3 02-22 00:15:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4bc4 02-22 00:15:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4bc5 02-22 00:15:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[4bc6 02-22 00:15:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4bc7 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4bc8 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4bc9 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4bca 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4bcb 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4bcc 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4bcd 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 83 a1 2a 76 7f 5e 78 a7 33 af 94 b7 38 64 f0 |...*v.^x.3...8d.|
00000010 d9 2a 83 3f 08 8e c9 a7 2a 01 57 6d 47 ac 5f 87 |.*.?....*.WmG._.|
[4bce 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 9a ea 97 3c e9 5c c0 77 b0 58 1e |0D. ....<.\.w.X.|
00000010 d9 ef eb 31 eb 53 33 54 3c ce e0 1c 05 3e a6 9a |...1.S3T<....>..|
00000020 c2 ab cd 88 02 20 02 f7 ba 2c cb 54 57 1d f3 8b |..... ...,.TW...|
00000030 f9 40 f1 f5 93 6a 97 6f 0a 4b b7 ae 33 1e 71 f1 |.@...j.o.K..3.q.|
00000040 40 e4 70 87 8c ba |@.p...|
[4bcf 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4bd0 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410e810 gate 1582330526664184200 evaluation starts
[4bd1 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410e810 signed by 0 principal evaluation starts (used [false])
[4bd2 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410e810 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4bd3 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410e810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4bd4 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410e810 principal evaluation fails
[4bd5 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410e810 gate 1582330526664184200 evaluation fails
[4bd6 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4bd7 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4bd8 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4bd9 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 83 a1 2a 76 7f 5e 78 a7 33 af 94 b7 38 64 f0 |...*v.^x.3...8d.|
00000010 d9 2a 83 3f 08 8e c9 a7 2a 01 57 6d 47 ac 5f 87 |.*.?....*.WmG._.|
[4bda 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 9a ea 97 3c e9 5c c0 77 b0 58 1e |0D. ....<.\.w.X.|
00000010 d9 ef eb 31 eb 53 33 54 3c ce e0 1c 05 3e a6 9a |...1.S3T<....>..|
00000020 c2 ab cd 88 02 20 02 f7 ba 2c cb 54 57 1d f3 8b |..... ...,.TW...|
00000030 f9 40 f1 f5 93 6a 97 6f 0a 4b b7 ae 33 1e 71 f1 |.@...j.o.K..3.q.|
00000040 40 e4 70 87 8c ba |@.p...|
[4bdb 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4bdc 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410f110 gate 1582330526668983200 evaluation starts
[4bdd 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410f110 signed by 0 principal evaluation starts (used [false])
[4bde 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410f110 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4bdf 02-22 00:15:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410f110 principal evaluation succeeds for identity 0
[4be0 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410f110 gate 1582330526668983200 evaluation succeeds
[4be1 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4be2 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4be3 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4be4 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4be5 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes
[4be6 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes]}
[4be7 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:61
[4be8 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:61
[4be9 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:60 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[4bea 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4beb 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4bec 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4bed 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[4bee 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4bef 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4bf0 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4bf1 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[4bf2 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[4bf3 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[4bf4 02-22 00:15:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4bf5 02-22 00:15:27.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4bf6 02-22 00:15:27.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4bf7 02-22 00:15:27.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[4bf8 02-22 00:15:27.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[4bf9 02-22 00:15:27.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4bfa 02-22 00:15:27.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[4bfb 02-22 00:15:27.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4bfc 02-22 00:15:27.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[4bfd 02-22 00:15:27.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4bfe 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4bff 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4c00 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[4c01 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[4c02 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[4c03 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[4c04 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c05 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c06 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4c07 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4c08 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4c09 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4c0a 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4c0b 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4c0c 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4c0d 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4c0e 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4c0f 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414e220 gate 1582330527057293900 evaluation starts
[4c10 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414e220 signed by 0 principal evaluation starts (used [false])
[4c11 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414e220 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4c12 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414e220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4c13 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414e220 principal evaluation fails
[4c14 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414e220 gate 1582330527057293900 evaluation fails
[4c15 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4c16 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4c17 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4c18 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4c19 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4c1a 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4c1b 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414eb20 gate 1582330527059672100 evaluation starts
[4c1c 02-22 00:15:27.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414eb20 signed by 0 principal evaluation starts (used [false])
[4c1d 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414eb20 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4c1e 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414eb20 principal evaluation succeeds for identity 0
[4c1f 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414eb20 gate 1582330527059672100 evaluation succeeds
[4c20 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4c21 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4c22 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4c23 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4c24 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c25 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c26 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4c27 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4c28 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4c29 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4c2a 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4c2b 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4c2c 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4c2d 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4c2e 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4c2f 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004164580 gate 1582330527065324600 evaluation starts
[4c30 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004164580 signed by 0 principal evaluation starts (used [false])
[4c31 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004164580 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4c32 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004164580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4c33 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004164580 principal evaluation fails
[4c34 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004164580 gate 1582330527065324600 evaluation fails
[4c35 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4c36 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4c37 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4c38 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4c39 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4c3a 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4c3b 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004164e80 gate 1582330527067338500 evaluation starts
[4c3c 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004164e80 signed by 0 principal evaluation starts (used [false])
[4c3d 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004164e80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4c3e 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004164e80 principal evaluation succeeds for identity 0
[4c3f 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004164e80 gate 1582330527067338500 evaluation succeeds
[4c40 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4c41 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4c42 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4c43 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4c44 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4c45 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4c46 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c47 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c48 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c49 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4c4a 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4c4b 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4c4c 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4c4d 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4c4e 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4c4f 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4c50 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4c51 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4c52 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417cb90 gate 1582330527068369100 evaluation starts
[4c53 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417cb90 signed by 0 principal evaluation starts (used [false])
[4c54 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417cb90 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4c55 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417cb90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4c56 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417cb90 principal evaluation fails
[4c57 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417cb90 gate 1582330527068369100 evaluation fails
[4c58 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4c59 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4c5a 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4c5b 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4c5c 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4c5d 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4c5e 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417d490 gate 1582330527068769800 evaluation starts
[4c5f 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417d490 signed by 0 principal evaluation starts (used [false])
[4c60 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417d490 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4c61 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417d490 principal evaluation succeeds for identity 0
[4c62 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417d490 gate 1582330527068769800 evaluation succeeds
[4c63 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4c64 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4c65 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4c66 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4c67 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[4c68 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[4c69 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[4c6a 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[4c6b 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c6c 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c6d 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4c6e 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4c6f 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4c70 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4c71 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4c72 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4c73 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4c74 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4c75 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4c76 02-22 00:15:27.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197c50 gate 1582330527069986800 evaluation starts
[4c77 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197c50 signed by 0 principal evaluation starts (used [false])
[4c78 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197c50 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4c79 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4c7a 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197c50 principal evaluation fails
[4c7b 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197c50 gate 1582330527069986800 evaluation fails
[4c7c 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4c7d 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4c7e 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4c7f 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4c80 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4c81 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4c82 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aa550 gate 1582330527070390800 evaluation starts
[4c83 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aa550 signed by 0 principal evaluation starts (used [false])
[4c84 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aa550 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4c85 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aa550 principal evaluation succeeds for identity 0
[4c86 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aa550 gate 1582330527070390800 evaluation succeeds
[4c87 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4c88 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4c89 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4c8a 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4c8b 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4c8c 02-22 00:15:27.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4c8d 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c8e 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c8f 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4c90 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4c91 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4c92 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4c93 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4c94 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4c95 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4c96 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4c97 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4c98 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4c99 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4260 gate 1582330527085758900 evaluation starts
[4c9a 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4260 signed by 0 principal evaluation starts (used [false])
[4c9b 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4260 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4c9c 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4c9d 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4260 principal evaluation fails
[4c9e 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4260 gate 1582330527085758900 evaluation fails
[4c9f 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4ca0 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4ca1 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4ca2 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4ca3 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4ca4 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4ca5 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4b60 gate 1582330527087909400 evaluation starts
[4ca6 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4b60 signed by 0 principal evaluation starts (used [false])
[4ca7 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4b60 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4ca8 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4b60 principal evaluation succeeds for identity 0
[4ca9 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4b60 gate 1582330527087909400 evaluation succeeds
[4caa 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4cab 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4cac 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4cad 02-22 00:15:27.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4cae 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[4caf 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[4cb0 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4cb1 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4cb2 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4cb3 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4cb4 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4cb5 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4cb6 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4cb7 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4cb8 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4cb9 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4cba 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4cbb 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448c70 gate 1582330527093310400 evaluation starts
[4cbc 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448c70 signed by 0 principal evaluation starts (used [false])
[4cbd 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448c70 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4cbe 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4cbf 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448c70 principal evaluation fails
[4cc0 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448c70 gate 1582330527093310400 evaluation fails
[4cc1 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4cc2 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4cc3 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4cc4 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4cc5 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4cc6 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4cc7 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004449570 gate 1582330527096352700 evaluation starts
[4cc8 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004449570 signed by 0 principal evaluation starts (used [false])
[4cc9 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004449570 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4cca 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004449570 principal evaluation succeeds for identity 0
[4ccb 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004449570 gate 1582330527096352700 evaluation succeeds
[4ccc 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4ccd 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4cce 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4ccf 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4cd0 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[4cd1 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[4cd2 02-22 00:15:27.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cd3 02-22 00:15:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4cd4 02-22 00:15:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4cd5 02-22 00:15:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[4cd6 02-22 00:15:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4cd7 02-22 00:15:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4cd8 02-22 00:15:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:1843599964034355038 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[4cd9 02-22 00:15:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:1843599964034355038 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[4cda 02-22 00:15:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cdb 02-22 00:15:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1843599964034355038 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[4cdc 02-22 00:15:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1843599964034355038 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[4cdd 02-22 00:15:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cde 02-22 00:15:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[4cdf 02-22 00:15:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ce0 02-22 00:15:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ce1 02-22 00:15:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ce2 02-22 00:15:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:1242532095904833003 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[4ce3 02-22 00:15:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:1242532095904833003 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[4ce4 02-22 00:15:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[4ce5 02-22 00:15:27.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ce6 02-22 00:15:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[4ce7 02-22 00:15:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ce8 02-22 00:15:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ce9 02-22 00:15:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4cea 02-22 00:15:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ceb 02-22 00:15:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[4cec 02-22 00:15:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[4ced 02-22 00:15:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4cee 02-22 00:15:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4cef 02-22 00:15:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4cf0 02-22 00:15:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cf1 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4cf2 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cf3 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4cf4 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[4cf5 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 7e 64 3b 65 da 34 29 77 b9 8e bc 6d 60 80 c6 |.~d;e.4)w...m`..|
00000010 cd ab 29 c9 30 78 b0 6b 10 96 9b 25 ea 78 1b 40 |..).0x.k...%.x.@|
[4cf6 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 aa 04 23 13 20 49 7b 77 7e 91 |0E.!....#. I{w~.|
00000010 ff 5f ee f6 ca f8 7a 89 8e 0a cc 14 12 50 60 a2 |._....z......P`.|
00000020 3a 40 c9 d8 51 02 20 43 94 a9 b5 59 51 59 36 48 |:@..Q. C...YQY6H|
00000030 65 c9 9a 62 70 c6 5b 3d 3e 02 fb d9 9a dc 8d 7a |e..bp.[=>......z|
00000040 86 84 15 37 ee 31 fa |...7.1.|
[4cf7 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[4cf8 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 7c 5e 56 12 7f d4 62 56 4b 8b 02 |0D. r|^V...bVK..|
00000010 30 ac d4 4c ea 43 40 7c 14 cf 70 82 ea d6 07 f6 |0..L.C@|..p.....|
00000020 c2 47 86 ff 02 20 7d 24 9c a8 fd bd 18 53 18 88 |.G... }$.....S..|
00000030 ae e9 68 2e de 23 07 61 c5 fa 9c 40 da 8a 5e ac |..h..#.a...@..^.|
00000040 4d a5 e3 07 9d 71 |M....q|
[4cf9 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4cfa 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[4cfb 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:65
[4cfc 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:65
[4cfd 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[4cfe 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4cff 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d00 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d01 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d02 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d03 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d04 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4d05 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d06 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4d07 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes
[4d08 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d09 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes
[4d0a 02-22 00:15:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d0b 02-22 00:15:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes
[4d0c 02-22 00:15:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes
[4d0d 02-22 00:15:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d0e 02-22 00:15:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes
[4d0f 02-22 00:15:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d10 02-22 00:15:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes
[4d11 02-22 00:15:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d12 02-22 00:15:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes
[4d13 02-22 00:15:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d14 02-22 00:15:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d15 02-22 00:15:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d16 02-22 00:15:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d17 02-22 00:15:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d18 02-22 00:15:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[4d19 02-22 00:15:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d1a 02-22 00:15:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4d1b 02-22 00:15:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4d1c 02-22 00:15:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4d1d 02-22 00:15:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4d1e 02-22 00:15:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4d1f 02-22 00:15:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4d20 02-22 00:15:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f be e0 6c 81 51 bd 03 97 fd 49 ee 2c 1b 33 9c |o..l.Q....I.,.3.|
00000010 8b 96 cd 17 2b 83 aa d6 cc b4 29 6b 79 a0 72 55 |....+.....)ky.rU|
[4d21 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 73 e3 e4 d8 75 84 57 04 7d e3 |0E.!..s...u.W.}.|
00000010 cf 3f 9c 62 80 23 25 c3 31 7b 1a c5 06 df 5b 23 |.?.b.#%.1{....[#|
00000020 34 f6 b8 a1 f4 02 20 17 52 2d 78 32 7a 35 81 68 |4..... .R-x2z5.h|
00000030 6c 13 b1 19 f8 30 74 3a ed 99 0c a3 61 ad 4d 53 |l....0t:....a.MS|
00000040 31 e1 ea 72 61 b0 31 |1..ra.1|
[4d22 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4d23 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a5950 gate 1582330529290452500 evaluation starts
[4d24 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a5950 signed by 0 principal evaluation starts (used [false])
[4d25 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a5950 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4d26 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a5950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4d27 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a5950 principal evaluation fails
[4d28 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a5950 gate 1582330529290452500 evaluation fails
[4d29 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4d2a 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4d2b 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4d2c 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f be e0 6c 81 51 bd 03 97 fd 49 ee 2c 1b 33 9c |o..l.Q....I.,.3.|
00000010 8b 96 cd 17 2b 83 aa d6 cc b4 29 6b 79 a0 72 55 |....+.....)ky.rU|
[4d2d 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 73 e3 e4 d8 75 84 57 04 7d e3 |0E.!..s...u.W.}.|
00000010 cf 3f 9c 62 80 23 25 c3 31 7b 1a c5 06 df 5b 23 |.?.b.#%.1{....[#|
00000020 34 f6 b8 a1 f4 02 20 17 52 2d 78 32 7a 35 81 68 |4..... .R-x2z5.h|
00000030 6c 13 b1 19 f8 30 74 3a ed 99 0c a3 61 ad 4d 53 |l....0t:....a.MS|
00000040 31 e1 ea 72 61 b0 31 |1..ra.1|
[4d2e 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4d2f 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b6250 gate 1582330529298698000 evaluation starts
[4d30 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b6250 signed by 0 principal evaluation starts (used [false])
[4d31 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b6250 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4d32 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b6250 principal evaluation succeeds for identity 0
[4d33 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b6250 gate 1582330529298698000 evaluation succeeds
[4d34 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4d35 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4d36 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4d37 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4d38 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d39 02-22 00:15:29.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes]}
[4d3a 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:64
[4d3b 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:64
[4d3c 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[4d3d 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d3e 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d3f 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d40 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d41 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d42 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d43 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d44 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d45 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d46 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d47 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d48 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d49 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d4a 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d4b 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4d4c 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d4d 02-22 00:15:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d4e 02-22 00:15:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d4f 02-22 00:15:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4d50 02-22 00:15:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d51 02-22 00:15:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d52 02-22 00:15:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d53 02-22 00:15:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d54 02-22 00:15:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes
[4d55 02-22 00:15:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d56 02-22 00:15:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[4d57 02-22 00:15:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[4d58 02-22 00:15:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510161801
[4d59 02-22 00:15:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8BB685D1F96CB7F0B28EDE1C815508DDC72081EE4328D76A5E8B0B2C25A89D73
[4d5a 02-22 00:15:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[4d5b 02-22 00:15:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d5c 02-22 00:15:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d5d 02-22 00:15:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d5e 02-22 00:15:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d5f 02-22 00:15:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:22 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[4d60 02-22 00:15:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d61 02-22 00:15:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d62 02-22 00:15:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:22 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[4d63 02-22 00:15:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d64 02-22 00:15:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes
[4d65 02-22 00:15:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d66 02-22 00:15:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes
[4d67 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[4d68 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d69 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4d6a 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4d6b 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4d6c 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4d6d 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4d6e 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4d6f 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f a7 97 07 31 c1 83 36 25 a2 53 27 17 01 57 f7 |....1..6%.S'..W.|
00000010 6b 45 28 5f e8 b3 19 f5 84 8d 40 ca a4 31 34 b1 |kE(_......@..14.|
[4d70 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e 0e 5d 42 ee d9 13 3a 2c c8 5c 78 |0D. ~.]B...:,.\x|
00000010 6c 1f 46 66 73 13 1d 3e 7b 88 cb c0 d8 a9 f7 df |l.Ffs..>{.......|
00000020 33 dc a8 f0 02 20 6e a1 93 58 6a d5 38 b7 7e 3e |3.... n..Xj.8.~>|
00000030 02 f4 d0 60 23 d2 40 c7 b6 c4 2f 5d 0c 2c c6 e3 |...`#.@.../].,..|
00000040 fa 4e 90 44 f1 a9 |.N.D..|
[4d71 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4d72 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e98f0 gate 1582330529361467700 evaluation starts
[4d73 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e98f0 signed by 0 principal evaluation starts (used [false])
[4d74 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e98f0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4d75 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e98f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4d76 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e98f0 principal evaluation fails
[4d77 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e98f0 gate 1582330529361467700 evaluation fails
[4d78 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4d79 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4d7a 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4d7b 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f a7 97 07 31 c1 83 36 25 a2 53 27 17 01 57 f7 |....1..6%.S'..W.|
00000010 6b 45 28 5f e8 b3 19 f5 84 8d 40 ca a4 31 34 b1 |kE(_......@..14.|
[4d7c 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e 0e 5d 42 ee d9 13 3a 2c c8 5c 78 |0D. ~.]B...:,.\x|
00000010 6c 1f 46 66 73 13 1d 3e 7b 88 cb c0 d8 a9 f7 df |l.Ffs..>{.......|
00000020 33 dc a8 f0 02 20 6e a1 93 58 6a d5 38 b7 7e 3e |3.... n..Xj.8.~>|
00000030 02 f4 d0 60 23 d2 40 c7 b6 c4 2f 5d 0c 2c c6 e3 |...`#.@.../].,..|
00000040 fa 4e 90 44 f1 a9 |.N.D..|
[4d7d 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4d7e 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fe1f0 gate 1582330529363358100 evaluation starts
[4d7f 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fe1f0 signed by 0 principal evaluation starts (used [false])
[4d80 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fe1f0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4d81 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fe1f0 principal evaluation succeeds for identity 0
[4d82 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fe1f0 gate 1582330529363358100 evaluation succeeds
[4d83 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4d84 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4d85 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4d86 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4d87 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes
[4d88 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes]}
[4d89 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:62
[4d8a 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:62
[4d8b 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[4d8c 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d8d 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d8e 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d8f 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d90 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d91 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d92 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d93 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d94 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d95 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d96 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[4d97 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4d98 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[4d99 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes
[4d9a 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d9b 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes
[4d9c 02-22 00:15:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4d9d 02-22 00:15:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes
[4d9e 02-22 00:15:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes
[4d9f 02-22 00:15:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4da0 02-22 00:15:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes
[4da1 02-22 00:15:29.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4da2 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15103D
[4da3 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5979B49A47B40C48F48CA98B2A05B042B6323737E04A09C219C983B349316187
[4da4 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[4da5 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[4da6 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[4da7 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4da8 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4da9 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4daa 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[4dab 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[4dac 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4dad 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes
[4dae 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4daf 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[4db0 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes
[4db1 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4db2 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4db3 02-22 00:15:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4db4 02-22 00:15:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes
[4db5 02-22 00:15:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4db6 02-22 00:15:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes
[4db7 02-22 00:15:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[4db8 02-22 00:15:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 79 b4 9a 47 b4 0c 48 f4 8c a9 8b 2a 05 b0 42 |Yy..G..H....*..B|
00000010 b6 32 37 37 e0 4a 09 c2 19 c9 83 b3 49 31 61 87 |.277.J......I1a.|
[4db9 02-22 00:15:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 ca b7 8e af 29 02 2d 10 f4 c4 21 |0D. w....).-...!|
00000010 b1 73 99 65 4f 31 dd 81 fd 40 13 0d c7 48 b1 6f |.s.eO1...@...H.o|
00000020 92 d6 59 5d 02 20 49 75 8d cc 60 f6 83 4b c4 87 |..Y]. Iu..`..K..|
00000030 71 2d 27 2a 55 5e 71 f9 fa d6 ca a3 a1 73 8b f7 |q-'*U^q......s..|
00000040 77 20 75 40 8e 4c |w u@.L|
[4dba 02-22 00:15:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes
[4dbb 02-22 00:15:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4dbc 02-22 00:15:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:8727396010568058545 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4dbd 02-22 00:15:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:8727396010568058545 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4dbe 02-22 00:15:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4dbf 02-22 00:15:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4dc0 02-22 00:15:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4dc1 02-22 00:15:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4dc2 02-22 00:15:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4dc3 02-22 00:15:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4dc4 02-22 00:15:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[4dc5 02-22 00:15:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4dc6 02-22 00:15:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[4dc7 02-22 00:15:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4dc8 02-22 00:15:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[4dc9 02-22 00:15:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[4dca 02-22 00:15:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e f9 d8 72 8d f7 45 f7 80 c3 e9 4b 4a 73 b9 ad |...r..E....KJs..|
00000010 2b b0 03 26 78 5f 99 bf c7 ca 90 95 f7 8d 18 c0 |+..&x_..........|
[4dcb 02-22 00:15:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 79 1f 8c 84 eb 0d 50 d8 bd 25 |0E.!..y.....P..%|
00000010 0c 48 e2 0c 72 a1 73 01 13 1f 8f 60 54 00 3c 48 |.H..r.s....`T.<H|
00000020 e4 c7 75 83 f9 02 20 4e 78 22 73 41 79 7f 29 18 |..u... Nx"sAy.).|
00000030 e4 58 e0 b5 7d 51 da 80 79 ac 3b d9 ac 3f 77 cc |.X..}Q..y.;..?w.|
00000040 65 aa 85 22 42 77 59 |e.."BwY|
[4dcc 02-22 00:15:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[4dcd 02-22 00:15:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 6e e6 70 55 96 60 cd 7d ea ff |0E.!..n.pU.`.}..|
00000010 73 3f 3a 57 e6 d5 f7 a1 aa c9 d6 00 60 1d df f4 |s?:W........`...|
00000020 43 34 65 9d 38 02 20 7e a4 31 5f 8b 0e 0d e3 dc |C4e.8. ~.1_.....|
00000030 ee f9 5a 54 4d b9 2a 96 f0 78 1d 92 2e 2a 10 46 |..ZTM.*..x...*.F|
00000040 4b 39 fb a3 3f 7e 37 |K9..?~7|
[4dce 02-22 00:15:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[4dcf 02-22 00:15:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[4dd0 02-22 00:15:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:66
[4dd1 02-22 00:15:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:66
[4dd2 02-22 00:15:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[4dd3 02-22 00:15:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4dd4 02-22 00:15:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4dd5 02-22 00:15:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4dd6 02-22 00:15:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[4dd7 02-22 00:15:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4dd8 02-22 00:15:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4dd9 02-22 00:15:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[4dda 02-22 00:15:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[4ddb 02-22 00:15:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[4ddc 02-22 00:15:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ddd 02-22 00:15:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:10796295266504289538 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4dde 02-22 00:15:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:10796295266504289538 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4ddf 02-22 00:15:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10796295266504289538 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4de0 02-22 00:15:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4de1 02-22 00:15:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4de2 02-22 00:15:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4de3 02-22 00:15:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4de4 02-22 00:15:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4de5 02-22 00:15:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4de6 02-22 00:15:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[4de7 02-22 00:15:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4de8 02-22 00:15:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:10872816746143394020 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4de9 02-22 00:15:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10872816746143394020 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4dea 02-22 00:15:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[4deb 02-22 00:15:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4dec 02-22 00:15:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[4ded 02-22 00:15:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:3492060355387455940 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[4dee 02-22 00:15:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[4def 02-22 00:15:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:8220286086167284155 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[4df0 02-22 00:15:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[4df1 02-22 00:15:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10501292013712529333 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[4df2 02-22 00:15:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10501292013712529333 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[4df3 02-22 00:15:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4df4 02-22 00:15:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:3492060355387455940 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4df5 02-22 00:15:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4df6 02-22 00:15:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:8220286086167284155 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4df7 02-22 00:15:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4df8 02-22 00:15:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8220286086167284155 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[4df9 02-22 00:15:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8220286086167284155 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[4dfa 02-22 00:15:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4dfb 02-22 00:15:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10501292013712529333 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[4dfc 02-22 00:15:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10501292013712529333 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[4dfd 02-22 00:15:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10501292013712529333 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[4dfe 02-22 00:15:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4dff 02-22 00:15:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3492060355387455940 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[4e00 02-22 00:15:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3492060355387455940 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[4e01 02-22 00:15:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e02 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4e03 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4e04 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e05 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[4e06 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[4e07 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e08 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4e09 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4e0a 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4e0b 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4e0c 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4e0d 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4e0e 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 e6 a1 55 a6 e0 80 de d1 53 99 69 f9 79 70 33 |1..U.....S.i.yp3|
00000010 e9 c3 94 bd 01 48 ec 50 90 ce 9c 83 d4 64 b7 48 |.....H.P.....d.H|
[4e0f 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 0c 38 70 47 02 be 8d 7e 63 66 f7 |0D. A.8pG...~cf.|
00000010 6d d0 e6 ff d3 f6 d9 55 b5 84 de 86 02 3b 82 c4 |m......U.....;..|
00000020 5f 09 3f 2d 02 20 12 a8 c3 06 13 64 8f fb 4e e1 |_.?-. .....d..N.|
00000030 9f ed 6e 78 38 8d e3 d4 a5 71 48 5b 67 47 0a f7 |..nx8....qH[gG..|
00000040 c5 5a fb 00 02 8c |.Z....|
[4e10 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4e11 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457fad0 gate 1582330530453794000 evaluation starts
[4e12 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457fad0 signed by 0 principal evaluation starts (used [false])
[4e13 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457fad0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4e14 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457fad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4e15 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457fad0 principal evaluation fails
[4e16 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457fad0 gate 1582330530453794000 evaluation fails
[4e17 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4e18 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4e19 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4e1a 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 e6 a1 55 a6 e0 80 de d1 53 99 69 f9 79 70 33 |1..U.....S.i.yp3|
00000010 e9 c3 94 bd 01 48 ec 50 90 ce 9c 83 d4 64 b7 48 |.....H.P.....d.H|
[4e1b 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 0c 38 70 47 02 be 8d 7e 63 66 f7 |0D. A.8pG...~cf.|
00000010 6d d0 e6 ff d3 f6 d9 55 b5 84 de 86 02 3b 82 c4 |m......U.....;..|
00000020 5f 09 3f 2d 02 20 12 a8 c3 06 13 64 8f fb 4e e1 |_.?-. .....d..N.|
00000030 9f ed 6e 78 38 8d e3 d4 a5 71 48 5b 67 47 0a f7 |..nx8....qH[gG..|
00000040 c5 5a fb 00 02 8c |.Z....|
[4e1c 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4e1d 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a43d0 gate 1582330530454440300 evaluation starts
[4e1e 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a43d0 signed by 0 principal evaluation starts (used [false])
[4e1f 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a43d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4e20 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a43d0 principal evaluation succeeds for identity 0
[4e21 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a43d0 gate 1582330530454440300 evaluation succeeds
[4e22 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4e23 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4e24 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4e25 02-22 00:15:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4e26 02-22 00:15:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes
[4e27 02-22 00:15:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes]}
[4e28 02-22 00:15:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:65
[4e29 02-22 00:15:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:65
[4e2a 02-22 00:15:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[4e2b 02-22 00:15:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e2c 02-22 00:15:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e2d 02-22 00:15:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e2e 02-22 00:15:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[4e2f 02-22 00:15:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e30 02-22 00:15:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e31 02-22 00:15:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e32 02-22 00:15:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[4e33 02-22 00:15:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[4e34 02-22 00:15:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[4e35 02-22 00:15:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e36 02-22 00:15:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15103E
[4e37 02-22 00:15:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F5FE6254414D9DD791373B221491EC57E34148DE25B81A6E5997A0B5FD445E63
[4e38 02-22 00:15:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[4e39 02-22 00:15:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[4e3a 02-22 00:15:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e3b 02-22 00:15:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[4e3c 02-22 00:15:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[4e3d 02-22 00:15:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e3e 02-22 00:15:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[4e3f 02-22 00:15:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4e40 02-22 00:15:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e41 02-22 00:15:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4e42 02-22 00:15:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e43 02-22 00:15:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[4e44 02-22 00:15:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e45 02-22 00:15:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[4e46 02-22 00:15:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e47 02-22 00:15:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[4e48 02-22 00:15:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[4e49 02-22 00:15:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 fe 62 54 41 4d 9d d7 91 37 3b 22 14 91 ec 57 |..bTAM...7;"...W|
00000010 e3 41 48 de 25 b8 1a 6e 59 97 a0 b5 fd 44 5e 63 |.AH.%..nY....D^c|
[4e4a 02-22 00:15:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 7c 9a 3b 82 c6 d1 24 31 3a 39 |0E.!..|.;...$1:9|
00000010 f6 83 58 c2 f2 a7 50 c7 8b 9e 0f 98 20 85 b1 f7 |..X...P..... ...|
00000020 41 34 18 d3 a0 02 20 5e 65 98 b4 e6 e9 01 b6 62 |A4.... ^e......b|
00000030 d7 df 54 28 1b 8a f5 7f 93 61 0b 7f f2 95 3d b4 |..T(.....a....=.|
00000040 e7 95 28 5e 5f 8b 4a |..(^_.J|
[4e4b 02-22 00:15:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4e4c 02-22 00:15:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4e4d 02-22 00:15:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e4e 02-22 00:15:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[4e4f 02-22 00:15:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e f9 d8 72 8d f7 45 f7 80 c3 e9 4b 4a 73 b9 ad |...r..E....KJs..|
00000010 2b b0 03 26 78 5f 99 bf c7 ca 90 95 f7 8d 18 c0 |+..&x_..........|
[4e50 02-22 00:15:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 79 1f 8c 84 eb 0d 50 d8 bd 25 |0E.!..y.....P..%|
00000010 0c 48 e2 0c 72 a1 73 01 13 1f 8f 60 54 00 3c 48 |.H..r.s....`T.<H|
00000020 e4 c7 75 83 f9 02 20 4e 78 22 73 41 79 7f 29 18 |..u... Nx"sAy.).|
00000030 e4 58 e0 b5 7d 51 da 80 79 ac 3b d9 ac 3f 77 cc |.X..}Q..y.;..?w.|
00000040 65 aa 85 22 42 77 59 |e.."BwY|
[4e51 02-22 00:15:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes
[4e52 02-22 00:15:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e53 02-22 00:15:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[4e54 02-22 00:15:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e55 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4e56 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4e57 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4e58 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4e59 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4e5a 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4e5b 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 e6 a1 55 a6 e0 80 de d1 53 99 69 f9 79 70 33 |1..U.....S.i.yp3|
00000010 e9 c3 94 bd 01 48 ec 50 90 ce 9c 83 d4 64 b7 48 |.....H.P.....d.H|
[4e5c 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 0c 38 70 47 02 be 8d 7e 63 66 f7 |0D. A.8pG...~cf.|
00000010 6d d0 e6 ff d3 f6 d9 55 b5 84 de 86 02 3b 82 c4 |m......U.....;..|
00000020 5f 09 3f 2d 02 20 12 a8 c3 06 13 64 8f fb 4e e1 |_.?-. .....d..N.|
00000030 9f ed 6e 78 38 8d e3 d4 a5 71 48 5b 67 47 0a f7 |..nx8....qH[gG..|
00000040 c5 5a fb 00 02 8c |.Z....|
[4e5d 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4e5e 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9410 gate 1582330530561352600 evaluation starts
[4e5f 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9410 signed by 0 principal evaluation starts (used [false])
[4e60 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9410 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4e61 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4e62 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9410 principal evaluation fails
[4e63 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9410 gate 1582330530561352600 evaluation fails
[4e64 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4e65 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4e66 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4e67 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 e6 a1 55 a6 e0 80 de d1 53 99 69 f9 79 70 33 |1..U.....S.i.yp3|
00000010 e9 c3 94 bd 01 48 ec 50 90 ce 9c 83 d4 64 b7 48 |.....H.P.....d.H|
[4e68 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 0c 38 70 47 02 be 8d 7e 63 66 f7 |0D. A.8pG...~cf.|
00000010 6d d0 e6 ff d3 f6 d9 55 b5 84 de 86 02 3b 82 c4 |m......U.....;..|
00000020 5f 09 3f 2d 02 20 12 a8 c3 06 13 64 8f fb 4e e1 |_.?-. .....d..N.|
00000030 9f ed 6e 78 38 8d e3 d4 a5 71 48 5b 67 47 0a f7 |..nx8....qH[gG..|
00000040 c5 5a fb 00 02 8c |.Z....|
[4e69 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4e6a 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9d10 gate 1582330530562690900 evaluation starts
[4e6b 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9d10 signed by 0 principal evaluation starts (used [false])
[4e6c 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9d10 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4e6d 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[4e6e 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[4e6f 02-22 00:15:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9d10 principal evaluation succeeds for identity 0
[4e70 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9d10 gate 1582330530562690900 evaluation succeeds
[4e71 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4e72 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4e73 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4e74 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4e75 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes
[4e76 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e77 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e78 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[4e79 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[4e7a 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 fe 62 54 41 4d 9d d7 91 37 3b 22 14 91 ec 57 |..bTAM...7;"...W|
00000010 e3 41 48 de 25 b8 1a 6e 59 97 a0 b5 fd 44 5e 63 |.AH.%..nY....D^c|
[4e7b 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 7c 9a 3b 82 c6 d1 24 31 3a 39 |0E.!..|.;...$1:9|
00000010 f6 83 58 c2 f2 a7 50 c7 8b 9e 0f 98 20 85 b1 f7 |..X...P..... ...|
00000020 41 34 18 d3 a0 02 20 5e 65 98 b4 e6 e9 01 b6 62 |A4.... ^e......b|
00000030 d7 df 54 28 1b 8a f5 7f 93 61 0b 7f f2 95 3d b4 |..T(.....a....=.|
00000040 e7 95 28 5e 5f 8b 4a |..(^_.J|
[4e7c 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4e7d 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes
[4e7e 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e7f 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[4e80 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e f9 d8 72 8d f7 45 f7 80 c3 e9 4b 4a 73 b9 ad |...r..E....KJs..|
00000010 2b b0 03 26 78 5f 99 bf c7 ca 90 95 f7 8d 18 c0 |+..&x_..........|
[4e81 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 79 1f 8c 84 eb 0d 50 d8 bd 25 |0E.!..y.....P..%|
00000010 0c 48 e2 0c 72 a1 73 01 13 1f 8f 60 54 00 3c 48 |.H..r.s....`T.<H|
00000020 e4 c7 75 83 f9 02 20 4e 78 22 73 41 79 7f 29 18 |..u... Nx"sAy.).|
00000030 e4 58 e0 b5 7d 51 da 80 79 ac 3b d9 ac 3f 77 cc |.X..}Q..y.;..?w.|
00000040 65 aa 85 22 42 77 59 |e.."BwY|
[4e82 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes
[4e83 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e84 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e85 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e86 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[4e87 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e88 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[4e89 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[4e8a 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 fe 62 54 41 4d 9d d7 91 37 3b 22 14 91 ec 57 |..bTAM...7;"...W|
00000010 e3 41 48 de 25 b8 1a 6e 59 97 a0 b5 fd 44 5e 63 |.AH.%..nY....D^c|
[4e8b 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 7c 9a 3b 82 c6 d1 24 31 3a 39 |0E.!..|.;...$1:9|
00000010 f6 83 58 c2 f2 a7 50 c7 8b 9e 0f 98 20 85 b1 f7 |..X...P..... ...|
00000020 41 34 18 d3 a0 02 20 5e 65 98 b4 e6 e9 01 b6 62 |A4.... ^e......b|
00000030 d7 df 54 28 1b 8a f5 7f 93 61 0b 7f f2 95 3d b4 |..T(.....a....=.|
00000040 e7 95 28 5e 5f 8b 4a |..(^_.J|
[4e8c 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[4e8d 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 a9 b5 52 cb e8 53 f8 08 59 2e ae |0D. R..R..S..Y..|
00000010 cb a1 50 43 fb 44 c4 50 6e be cf f7 a3 ba 4a 0e |..PC.D.Pn.....J.|
00000020 fe 8a bc 87 02 20 14 50 76 7f 87 cd 6d a0 2e b0 |..... .Pv...m...|
00000030 36 db 5c 55 09 45 1e e1 db d6 e6 ff e3 92 f7 d0 |6.\U.E..........|
00000040 d4 eb 93 c2 a8 7a |.....z|
[4e8e 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4e8f 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:62 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4e90 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e91 02-22 00:15:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e92 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4e94 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[4e95 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[4e96 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4e97 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4e98 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4e99 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4e9a 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4e9b 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4e9c 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4e9d 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 d5 8f 70 23 72 fa 77 ee 80 3e 99 da 14 ff 29 |6..p#r.w..>....)|
00000010 54 29 fe 9c 4b 24 52 2a 47 01 79 5d 8b 31 f2 37 |T)..K$R*G.y].1.7|
[4e9e 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 7a c2 79 0e 17 e6 37 92 5b f7 |0E.!..z.y...7.[.|
00000010 c5 a3 1d c4 fe f4 8b c9 48 fa 76 e6 86 97 24 59 |........H.v...$Y|
00000020 01 4b eb 6e 21 02 20 25 c7 b7 75 9e e6 2a b4 c3 |.K.n!. %..u..*..|
00000030 4e 52 64 5b e1 3a fc 81 aa d7 d0 3c 67 6f fc 79 |NRd[.:.....<go.y|
00000040 b5 ce f8 12 bb 55 17 |.....U.|
[4e9f 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4ea0 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461e7c0 gate 1582330530625367900 evaluation starts
[4ea1 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461e7c0 signed by 0 principal evaluation starts (used [false])
[4ea2 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461e7c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4ea3 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461e7c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4ea4 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461e7c0 principal evaluation fails
[4ea5 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461e7c0 gate 1582330530625367900 evaluation fails
[4ea6 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4ea7 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4ea8 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4ea9 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 d5 8f 70 23 72 fa 77 ee 80 3e 99 da 14 ff 29 |6..p#r.w..>....)|
00000010 54 29 fe 9c 4b 24 52 2a 47 01 79 5d 8b 31 f2 37 |T)..K$R*G.y].1.7|
[4eaa 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 7a c2 79 0e 17 e6 37 92 5b f7 |0E.!..z.y...7.[.|
00000010 c5 a3 1d c4 fe f4 8b c9 48 fa 76 e6 86 97 24 59 |........H.v...$Y|
00000020 01 4b eb 6e 21 02 20 25 c7 b7 75 9e e6 2a b4 c3 |.K.n!. %..u..*..|
00000030 4e 52 64 5b e1 3a fc 81 aa d7 d0 3c 67 6f fc 79 |NRd[.:.....<go.y|
00000040 b5 ce f8 12 bb 55 17 |.....U.|
[4eab 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4eac 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461f0c0 gate 1582330530627522500 evaluation starts
[4ead 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461f0c0 signed by 0 principal evaluation starts (used [false])
[4eae 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461f0c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4eaf 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461f0c0 principal evaluation succeeds for identity 0
[4eb0 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461f0c0 gate 1582330530627522500 evaluation succeeds
[4eb1 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4eb2 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4eb3 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4eb4 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4eb5 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes
[4eb6 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes]}
[4eb7 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:63
[4eb8 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:63
[4eb9 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[4eba 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ebb 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ebc 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ebd 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[4ebe 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ebf 02-22 00:15:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ec0 02-22 00:15:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ec1 02-22 00:15:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[4ec2 02-22 00:15:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[4ec3 02-22 00:15:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[4ec4 02-22 00:15:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4e93 02-22 00:15:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ec5 02-22 00:15:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ec6 02-22 00:15:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ec7 02-22 00:15:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[4ec8 02-22 00:15:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[4ec9 02-22 00:15:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4eca 02-22 00:15:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[4ecc 02-22 00:15:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ecb 02-22 00:15:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[4ecd 02-22 00:15:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4ece 02-22 00:15:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4ecf 02-22 00:15:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4ed0 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[4ed1 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[4ed2 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[4ed3 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[4ed4 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ed5 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ed6 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4ed7 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4ed8 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4ed9 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4eda 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4edb 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4edc 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4edd 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4ede 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4edf 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464d390 gate 1582330531025587800 evaluation starts
[4ee0 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464d390 signed by 0 principal evaluation starts (used [false])
[4ee1 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464d390 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4ee2 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464d390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4ee3 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464d390 principal evaluation fails
[4ee4 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464d390 gate 1582330531025587800 evaluation fails
[4ee5 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4ee6 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4ee7 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4ee8 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4ee9 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4eea 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4eeb 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464dc90 gate 1582330531027298300 evaluation starts
[4eec 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464dc90 signed by 0 principal evaluation starts (used [false])
[4eed 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464dc90 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4eee 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464dc90 principal evaluation succeeds for identity 0
[4eef 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464dc90 gate 1582330531027298300 evaluation succeeds
[4ef0 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4ef1 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4ef2 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4ef3 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4ef4 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ef5 02-22 00:15:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ef6 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4ef7 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4ef8 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4ef9 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4efa 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4efb 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4efc 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4efd 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4efe 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4eff 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046636f0 gate 1582330531033552000 evaluation starts
[4f00 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046636f0 signed by 0 principal evaluation starts (used [false])
[4f01 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046636f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4f02 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046636f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4f03 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046636f0 principal evaluation fails
[4f04 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046636f0 gate 1582330531033552000 evaluation fails
[4f05 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4f06 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4f07 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4f08 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4f09 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4f0a 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4f0b 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004663ff0 gate 1582330531034087000 evaluation starts
[4f0c 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004663ff0 signed by 0 principal evaluation starts (used [false])
[4f0d 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004663ff0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4f0e 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004663ff0 principal evaluation succeeds for identity 0
[4f0f 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004663ff0 gate 1582330531034087000 evaluation succeeds
[4f10 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4f11 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4f12 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4f13 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4f14 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4f15 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4f16 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f17 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f18 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f19 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4f1a 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4f1b 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4f1c 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4f1d 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4f1e 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4f1f 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4f20 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4f21 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4f22 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004677d00 gate 1582330531036560300 evaluation starts
[4f23 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004677d00 signed by 0 principal evaluation starts (used [false])
[4f24 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004677d00 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4f25 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004677d00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4f26 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004677d00 principal evaluation fails
[4f27 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004677d00 gate 1582330531036560300 evaluation fails
[4f28 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4f29 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4f2a 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4f2b 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4f2c 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4f2d 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4f2e 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690600 gate 1582330531037003600 evaluation starts
[4f2f 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690600 signed by 0 principal evaluation starts (used [false])
[4f30 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690600 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4f31 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690600 principal evaluation succeeds for identity 0
[4f32 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690600 gate 1582330531037003600 evaluation succeeds
[4f33 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4f34 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4f35 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4f36 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4f37 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[4f38 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[4f39 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[4f3a 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[4f3b 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f3c 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f3d 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4f3e 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4f3f 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4f40 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4f41 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4f42 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4f43 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4f44 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4f45 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4f46 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a8dc0 gate 1582330531039554200 evaluation starts
[4f47 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a8dc0 signed by 0 principal evaluation starts (used [false])
[4f48 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a8dc0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4f49 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a8dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4f4a 02-22 00:15:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a8dc0 principal evaluation fails
[4f4b 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a8dc0 gate 1582330531039554200 evaluation fails
[4f4c 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4f4d 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4f4e 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4f4f 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4f50 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4f51 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4f52 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a96c0 gate 1582330531040386100 evaluation starts
[4f53 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a96c0 signed by 0 principal evaluation starts (used [false])
[4f54 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a96c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4f55 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a96c0 principal evaluation succeeds for identity 0
[4f56 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a96c0 gate 1582330531040386100 evaluation succeeds
[4f57 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4f58 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4f59 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4f5a 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4f5b 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4f5c 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[4f5d 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f5e 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f5f 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f60 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4f61 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4f62 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4f63 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4f64 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4f65 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4f66 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4f67 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4f68 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4f69 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c13d0 gate 1582330531044420000 evaluation starts
[4f6a 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c13d0 signed by 0 principal evaluation starts (used [false])
[4f6b 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c13d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4f6c 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c13d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4f6d 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c13d0 principal evaluation fails
[4f6e 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c13d0 gate 1582330531044420000 evaluation fails
[4f6f 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4f70 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4f71 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4f72 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[4f73 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[4f74 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4f75 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c1cd0 gate 1582330531044942300 evaluation starts
[4f76 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c1cd0 signed by 0 principal evaluation starts (used [false])
[4f77 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c1cd0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4f78 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c1cd0 principal evaluation succeeds for identity 0
[4f79 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c1cd0 gate 1582330531044942300 evaluation succeeds
[4f7a 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4f7b 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4f7c 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4f7d 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4f7e 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[4f7f 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[4f80 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f81 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4f82 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4f83 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4f84 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4f85 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4f86 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4f87 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4f88 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4f89 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4f8a 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4f8b 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ddde0 gate 1582330531048717600 evaluation starts
[4f8c 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ddde0 signed by 0 principal evaluation starts (used [false])
[4f8d 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ddde0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4f8e 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ddde0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4f8f 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ddde0 principal evaluation fails
[4f90 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ddde0 gate 1582330531048717600 evaluation fails
[4f91 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[4f92 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[4f93 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[4f94 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[4f95 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[4f96 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4f97 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f26e0 gate 1582330531049140100 evaluation starts
[4f98 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f26e0 signed by 0 principal evaluation starts (used [false])
[4f99 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f26e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[4f9a 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f26e0 principal evaluation succeeds for identity 0
[4f9b 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f26e0 gate 1582330531049140100 evaluation succeeds
[4f9c 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[4f9d 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[4f9e 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[4f9f 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[4fa0 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[4fa1 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[4fa2 02-22 00:15:31.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fa3 02-22 00:15:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fa4 02-22 00:15:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fa5 02-22 00:15:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[4fa6 02-22 00:15:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fa7 02-22 00:15:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fa8 02-22 00:15:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6293320442543809426 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[4fa9 02-22 00:15:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6293320442543809426 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[4faa 02-22 00:15:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fab 02-22 00:15:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6293320442543809426 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[4fac 02-22 00:15:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6293320442543809426 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[4fad 02-22 00:15:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fae 02-22 00:15:31.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[4faf 02-22 00:15:31.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fb0 02-22 00:15:31.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fb1 02-22 00:15:31.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fb2 02-22 00:15:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5669419911068436340 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[4fb3 02-22 00:15:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5669419911068436340 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[4fb4 02-22 00:15:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[4fb5 02-22 00:15:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fb6 02-22 00:15:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[4fb7 02-22 00:15:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fb8 02-22 00:15:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fb9 02-22 00:15:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fba 02-22 00:15:31.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fbb 02-22 00:15:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[4fbc 02-22 00:15:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[4fbd 02-22 00:15:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fbe 02-22 00:15:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fbf 02-22 00:15:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fc0 02-22 00:15:32.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fc1 02-22 00:15:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:3316503391720290347 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4fc2 02-22 00:15:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:3316503391720290347 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[4fc3 02-22 00:15:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fc4 02-22 00:15:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fc5 02-22 00:15:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fc6 02-22 00:15:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fc7 02-22 00:15:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fc8 02-22 00:15:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fc9 02-22 00:15:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[4fca 02-22 00:15:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fcb 02-22 00:15:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4fcc 02-22 00:15:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fcd 02-22 00:15:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4fce 02-22 00:15:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[4fcf 02-22 00:15:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de cd 1b b9 cb eb 7b a5 d0 72 fb dc 85 22 0f f5 |......{..r..."..|
00000010 1d 6b 1d 47 19 1e 23 45 71 e3 44 f6 4b 90 a5 b4 |.k.G..#Eq.D.K...|
[4fd0 02-22 00:15:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 2e 44 fb fa a0 1a 23 40 a4 10 |0E.!...D....#@..|
00000010 48 79 fa 87 eb 03 dc cc d5 ea b4 dc aa 86 d0 1d |Hy..............|
00000020 73 44 c8 da 99 02 20 3c 55 36 1c 42 63 e3 49 07 |sD.... <U6.Bc.I.|
00000030 8b f8 7e f3 57 1a bc c7 2a bb c8 b6 67 94 05 67 |..~.W...*...g..g|
00000040 53 1e ad e8 7f 2e bd |S......|
[4fd1 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[4fd2 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 36 d8 f8 b9 5d 1d fe a8 b4 80 7b |0D. >6...].....{|
00000010 01 97 ec 77 36 36 d7 48 94 bd 2d d6 bf 7c b5 89 |...w66.H..-..|..|
00000020 a1 b4 71 c3 02 20 46 ee 3b 45 e6 51 09 bf 47 4b |..q.. F.;E.Q..GK|
00000030 ce e3 aa de 3c e6 c0 2e 7b 5d 34 b4 96 ed ea 2e |....<...{]4.....|
00000040 fa cf 04 2d f4 21 |...-.!|
[4fd3 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[4fd4 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[4fd5 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:67
[4fd6 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:67
[4fd7 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[4fd8 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fd9 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fda 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fdb 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fdc 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fdd 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fde 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4fdf 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4fe0 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[4fe1 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes
[4fe2 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fe3 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes
[4fe4 02-22 00:15:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fe5 02-22 00:15:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes
[4fe6 02-22 00:15:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes
[4fe7 02-22 00:15:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fe8 02-22 00:15:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes
[4fe9 02-22 00:15:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fea 02-22 00:15:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[4feb 02-22 00:15:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[4fec 02-22 00:15:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[4fed 02-22 00:15:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[4fee 02-22 00:15:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[4fef 02-22 00:15:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[4ff0 02-22 00:15:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[4ff1 02-22 00:15:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[4ff2 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[4ff3 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[4ff4 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[4ff5 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[4ff6 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 a8 29 8d bf a1 20 f4 2e b0 b1 7f ac d0 95 a8 |$.)... .........|
00000010 08 d4 ea 59 a6 d4 9f fa 0f c0 e8 55 fc 56 58 74 |...Y.......U.VXt|
[4ff7 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 ee da 21 48 4f e0 b2 8f ae f5 59 |0D. U..!HO.....Y|
00000010 7d 74 46 81 1a 9c 55 7a c0 6e b0 1d 7b df 1b 14 |}tF...Uz.n..{...|
00000020 40 de 8b b4 02 20 77 60 a4 ca cf 17 67 bd 1c b5 |@.... w`....g...|
00000030 4b e6 7f 41 70 bc 15 d7 b2 04 71 5f bf f9 68 2a |K..Ap.....q_..h*|
00000040 ea af a3 33 2e 7c |...3.||
[4ff8 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[4ff9 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004751270 gate 1582330534280430300 evaluation starts
[4ffa 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004751270 signed by 0 principal evaluation starts (used [false])
[4ffb 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004751270 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[4ffc 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004751270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[4ffd 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004751270 principal evaluation fails
[4ffe 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004751270 gate 1582330534280430300 evaluation fails
[4fff 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5000 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5001 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5002 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 a8 29 8d bf a1 20 f4 2e b0 b1 7f ac d0 95 a8 |$.)... .........|
00000010 08 d4 ea 59 a6 d4 9f fa 0f c0 e8 55 fc 56 58 74 |...Y.......U.VXt|
[5003 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 ee da 21 48 4f e0 b2 8f ae f5 59 |0D. U..!HO.....Y|
00000010 7d 74 46 81 1a 9c 55 7a c0 6e b0 1d 7b df 1b 14 |}tF...Uz.n..{...|
00000020 40 de 8b b4 02 20 77 60 a4 ca cf 17 67 bd 1c b5 |@.... w`....g...|
00000030 4b e6 7f 41 70 bc 15 d7 b2 04 71 5f bf f9 68 2a |K..Ap.....q_..h*|
00000040 ea af a3 33 2e 7c |...3.||
[5004 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5005 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004751b70 gate 1582330534281027600 evaluation starts
[5006 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004751b70 signed by 0 principal evaluation starts (used [false])
[5007 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004751b70 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5008 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004751b70 principal evaluation succeeds for identity 0
[5009 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004751b70 gate 1582330534281027600 evaluation succeeds
[500a 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[500b 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[500c 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[500d 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[500e 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[500f 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes]}
[5010 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:66
[5011 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:66
[5012 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[5013 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5014 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5015 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5016 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[5017 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5018 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[5019 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[501a 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[501b 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[501c 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[501d 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[501e 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[501f 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5020 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5021 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5022 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5023 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5024 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[5025 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5026 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[5027 02-22 00:15:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5028 02-22 00:15:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:5912230850338810473 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5029 02-22 00:15:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:5912230850338810473 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[502a 02-22 00:15:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:5912230850338810473 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[502b 02-22 00:15:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[502c 02-22 00:15:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[502d 02-22 00:15:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[502e 02-22 00:15:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[502f 02-22 00:15:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5030 02-22 00:15:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5031 02-22 00:15:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[5032 02-22 00:15:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5033 02-22 00:15:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[5034 02-22 00:15:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[5035 02-22 00:15:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510171801
[5036 02-22 00:15:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E7D4C7E6733848435434227392262FC7BE5201D5BED41C0E9A685547DACC81A2
[5037 02-22 00:15:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[5038 02-22 00:15:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5039 02-22 00:15:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[503a 02-22 00:15:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[503b 02-22 00:15:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[503c 02-22 00:15:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:23 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[503d 02-22 00:15:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[503e 02-22 00:15:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[503f 02-22 00:15:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:23 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[5040 02-22 00:15:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5041 02-22 00:15:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[5042 02-22 00:15:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5043 02-22 00:15:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[5044 02-22 00:15:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[5045 02-22 00:15:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 fb 99 58 d5 a0 b9 06 68 9b 90 75 8b 09 c3 96 |D..X....h..u....|
00000010 4a 1c a7 d1 9e 19 7b 85 65 90 8d 8b 0d d9 d2 c1 |J.....{.e.......|
[5047 02-22 00:15:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 1e f9 38 f2 46 4d a5 21 d5 2d |0E.!....8.FM.!.-|
00000010 37 e5 00 ce c6 af 82 df 51 75 2a 1a 78 f7 46 fe |7.......Qu*.x.F.|
00000020 b1 bf 1f b6 dd 02 20 32 11 1b c2 9b 25 3c f1 00 |...... 2....%<..|
00000030 38 96 0d 4a 78 ee 5b 3f 46 9a 6b 83 cf 23 e0 45 |8..Jx.[?F.k..#.E|
00000040 5c fd bf be b4 c4 ca |\......|
[5046 02-22 00:15:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[5048 02-22 00:15:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[5049 02-22 00:15:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f df e5 55 e5 49 a1 10 15 4a 74 7e |0D. ...U.I...Jt~|
00000010 eb 65 8a 11 5f 5d 74 74 c5 9f 25 48 79 50 ad 0d |.e.._]tt..%HyP..|
00000020 3a bf de 59 02 20 15 9c 0b 7d ed a5 90 c4 99 7d |:..Y. ...}.....}|
00000030 67 c5 1e 5b 09 7c fe 73 ca ce 16 38 75 b7 7f 04 |g..[.|.s...8u...|
00000040 09 7f 7a 09 45 b9 |..z.E.|
[504a 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[504b 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[504c 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:68
[504d 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:68
[504e 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[504f 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5050 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5051 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5052 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[5053 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5054 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5055 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[5056 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[5057 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[5058 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5059 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[505a 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:13908859514927855875 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[505b 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13908859514927855875 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[505c 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[505d 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[505e 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[505f 02-22 00:15:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5060 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes
[5061 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5062 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes
[5063 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[5064 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5065 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5066 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5067 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5068 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5069 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[506a 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[506b 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 53 64 f8 fc 0e f7 60 a2 14 c3 7b dd b9 f3 55 |~Sd....`...{...U|
00000010 11 c7 2f 2b 6c 87 f4 d1 e1 dd ea 87 a4 a1 f7 40 |../+l..........@|
[506c 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 9b ee 0d d9 4f b0 19 13 eb e7 53 |0D. Y....O.....S|
00000010 13 4f af a1 06 b5 c5 f8 c7 2e 8b cb 79 10 49 70 |.O..........y.Ip|
00000020 3e ee df cd 02 20 78 17 5e 42 e2 ee 45 e4 78 19 |>.... x.^B..E.x.|
00000030 f0 db e6 6a a1 c2 cc d6 27 05 03 3e 4e 6e ce f3 |...j....'..>Nn..|
00000040 13 68 fb 35 15 46 |.h.5.F|
[506d 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[506e 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cb480 gate 1582330534361668500 evaluation starts
[506f 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cb480 signed by 0 principal evaluation starts (used [false])
[5070 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cb480 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5071 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cb480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5072 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cb480 principal evaluation fails
[5073 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cb480 gate 1582330534361668500 evaluation fails
[5074 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5075 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5076 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5077 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 53 64 f8 fc 0e f7 60 a2 14 c3 7b dd b9 f3 55 |~Sd....`...{...U|
00000010 11 c7 2f 2b 6c 87 f4 d1 e1 dd ea 87 a4 a1 f7 40 |../+l..........@|
[5078 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 9b ee 0d d9 4f b0 19 13 eb e7 53 |0D. Y....O.....S|
00000010 13 4f af a1 06 b5 c5 f8 c7 2e 8b cb 79 10 49 70 |.O..........y.Ip|
00000020 3e ee df cd 02 20 78 17 5e 42 e2 ee 45 e4 78 19 |>.... x.^B..E.x.|
00000030 f0 db e6 6a a1 c2 cc d6 27 05 03 3e 4e 6e ce f3 |...j....'..>Nn..|
00000040 13 68 fb 35 15 46 |.h.5.F|
[5079 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[507a 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cbd80 gate 1582330534362272900 evaluation starts
[507b 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cbd80 signed by 0 principal evaluation starts (used [false])
[507c 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cbd80 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[507d 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cbd80 principal evaluation succeeds for identity 0
[507e 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cbd80 gate 1582330534362272900 evaluation succeeds
[507f 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5080 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5081 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5082 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5083 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes
[5084 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes]}
[5085 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:64
[5086 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:64
[5087 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[5088 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5089 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[508a 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[508b 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[508c 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[508d 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[508e 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[508f 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5090 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5091 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5092 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5093 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5094 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5095 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes
[5096 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes
[5098 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5097 02-22 00:15:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5099 02-22 00:15:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes
[509a 02-22 00:15:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes
[509b 02-22 00:15:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[509c 02-22 00:15:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes
[509e 02-22 00:15:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[509d 02-22 00:15:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[509f 02-22 00:15:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2457391059320875838 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[50a0 02-22 00:15:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[50a1 02-22 00:15:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10750495963990116358 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[50a2 02-22 00:15:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[50a4 02-22 00:15:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:11913764957936915216 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[50a5 02-22 00:15:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10750495963990116358 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[50a7 02-22 00:15:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50a6 02-22 00:15:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:11913764957936915216 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[50a8 02-22 00:15:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50a3 02-22 00:15:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2457391059320875838 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[50a9 02-22 00:15:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50aa 02-22 00:15:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10750495963990116358 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[50ab 02-22 00:15:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10750495963990116358 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[50ac 02-22 00:15:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50ad 02-22 00:15:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11913764957936915216 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[50ae 02-22 00:15:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11913764957936915216 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[50af 02-22 00:15:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11913764957936915216 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[50b0 02-22 00:15:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50b1 02-22 00:15:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2457391059320875838 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[50b2 02-22 00:15:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2457391059320875838 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[50b3 02-22 00:15:34.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50b4 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[50b5 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[50b6 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50b7 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[50b8 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[50b9 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50ba 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[50bb 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[50bc 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[50bd 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[50be 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[50bf 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[50c0 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 e0 03 bc d5 01 4d b7 cd 21 bc 87 76 65 e9 14 |......M..!..ve..|
00000010 19 71 a0 cd 29 43 4a 33 c2 53 e3 0d f5 9c 48 d3 |.q..)CJ3.S....H.|
[50c1 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 23 3b b2 12 a6 0b 9a b1 14 e1 1f |0D. .#;.........|
00000010 e7 4f d5 26 f5 f7 54 ea 62 55 c3 e2 38 d6 7c 06 |.O.&..T.bU..8.|.|
00000020 02 ce 8d 29 02 20 75 e8 8e 8f 78 4d 67 fe 8c 7f |...). u...xMg...|
00000030 aa 91 3f 19 4e 33 b1 06 54 61 e3 a7 98 c0 09 27 |..?.N3..Ta.....'|
00000040 e3 6b 9b d7 55 cd |.k..U.|
[50c2 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[50c3 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004818350 gate 1582330534459460400 evaluation starts
[50c4 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004818350 signed by 0 principal evaluation starts (used [false])
[50c5 02-22 00:15:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004818350 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[50c6 02-22 00:15:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004818350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[50c7 02-22 00:15:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004818350 principal evaluation fails
[50c8 02-22 00:15:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004818350 gate 1582330534459460400 evaluation fails
[50c9 02-22 00:15:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[50ca 02-22 00:15:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[50cb 02-22 00:15:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[50cc 02-22 00:15:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 e0 03 bc d5 01 4d b7 cd 21 bc 87 76 65 e9 14 |......M..!..ve..|
00000010 19 71 a0 cd 29 43 4a 33 c2 53 e3 0d f5 9c 48 d3 |.q..)CJ3.S....H.|
[50cd 02-22 00:15:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 23 3b b2 12 a6 0b 9a b1 14 e1 1f |0D. .#;.........|
00000010 e7 4f d5 26 f5 f7 54 ea 62 55 c3 e2 38 d6 7c 06 |.O.&..T.bU..8.|.|
00000020 02 ce 8d 29 02 20 75 e8 8e 8f 78 4d 67 fe 8c 7f |...). u...xMg...|
00000030 aa 91 3f 19 4e 33 b1 06 54 61 e3 a7 98 c0 09 27 |..?.N3..Ta.....'|
00000040 e3 6b 9b d7 55 cd |.k..U.|
[50ce 02-22 00:15:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[50cf 02-22 00:15:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004818c50 gate 1582330534473390100 evaluation starts
[50d0 02-22 00:15:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004818c50 signed by 0 principal evaluation starts (used [false])
[50d1 02-22 00:15:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004818c50 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[50d2 02-22 00:15:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004818c50 principal evaluation succeeds for identity 0
[50d3 02-22 00:15:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004818c50 gate 1582330534473390100 evaluation succeeds
[50d4 02-22 00:15:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[50d5 02-22 00:15:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[50d6 02-22 00:15:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[50d7 02-22 00:15:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[50d8 02-22 00:15:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[50d9 02-22 00:15:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes]}
[50da 02-22 00:15:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:67
[50db 02-22 00:15:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:67
[50dc 02-22 00:15:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[50dd 02-22 00:15:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50de 02-22 00:15:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50df 02-22 00:15:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50e0 02-22 00:15:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[50e1 02-22 00:15:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50e2 02-22 00:15:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50e3 02-22 00:15:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50e4 02-22 00:15:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[50e5 02-22 00:15:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[50e6 02-22 00:15:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[50e7 02-22 00:15:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50e8 02-22 00:15:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15103F
[50e9 02-22 00:15:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AFD505EAD0220DFC34A352284A8942CB66052AAECFAA559BDE8C6B32ED19D3A9
[50ea 02-22 00:15:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[50eb 02-22 00:15:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[50ec 02-22 00:15:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50ed 02-22 00:15:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[50ee 02-22 00:15:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[50ef 02-22 00:15:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[50f0 02-22 00:15:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[50f1 02-22 00:15:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50f2 02-22 00:15:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[50f4 02-22 00:15:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[50f3 02-22 00:15:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[50f5 02-22 00:15:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50f6 02-22 00:15:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50f7 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[50f8 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[50f9 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[50fa 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[50fb 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af d5 05 ea d0 22 0d fc 34 a3 52 28 4a 89 42 cb |....."..4.R(J.B.|
00000010 66 05 2a ae cf aa 55 9b de 8c 6b 32 ed 19 d3 a9 |f.*...U...k2....|
[50fc 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 51 9c 06 ad 8c ea 93 fb 9b 75 |0E.!..Q........u|
00000010 03 15 70 21 e3 35 ad c3 e6 8d 4e 8d b6 82 ee a8 |..p!.5....N.....|
00000020 ae 6d 7c 99 76 02 20 54 50 77 e3 f0 13 c4 65 5e |.m|.v. TPw....e^|
00000030 7c c6 45 6f b8 d9 e5 e5 92 55 6a a2 5f 68 34 82 ||.Eo.....Uj._h4.|
00000040 95 40 22 22 9c a7 cf |.@""...|
[50fd 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes
[50fe 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes
[50ff 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5100 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[5101 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 fb 99 58 d5 a0 b9 06 68 9b 90 75 8b 09 c3 96 |D..X....h..u....|
00000010 4a 1c a7 d1 9e 19 7b 85 65 90 8d 8b 0d d9 d2 c1 |J.....{.e.......|
[5102 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 1e f9 38 f2 46 4d a5 21 d5 2d |0E.!....8.FM.!.-|
00000010 37 e5 00 ce c6 af 82 df 51 75 2a 1a 78 f7 46 fe |7.......Qu*.x.F.|
00000020 b1 bf 1f b6 dd 02 20 32 11 1b c2 9b 25 3c f1 00 |...... 2....%<..|
00000030 38 96 0d 4a 78 ee 5b 3f 46 9a 6b 83 cf 23 e0 45 |8..Jx.[?F.k..#.E|
00000040 5c fd bf be b4 c4 ca |\......|
[5103 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes
[5104 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5105 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[5106 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5107 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5108 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5109 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[510a 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[510b 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[510c 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[510d 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 e0 03 bc d5 01 4d b7 cd 21 bc 87 76 65 e9 14 |......M..!..ve..|
00000010 19 71 a0 cd 29 43 4a 33 c2 53 e3 0d f5 9c 48 d3 |.q..)CJ3.S....H.|
[510e 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 23 3b b2 12 a6 0b 9a b1 14 e1 1f |0D. .#;.........|
00000010 e7 4f d5 26 f5 f7 54 ea 62 55 c3 e2 38 d6 7c 06 |.O.&..T.bU..8.|.|
00000020 02 ce 8d 29 02 20 75 e8 8e 8f 78 4d 67 fe 8c 7f |...). u...xMg...|
00000030 aa 91 3f 19 4e 33 b1 06 54 61 e3 a7 98 c0 09 27 |..?.N3..Ta.....'|
00000040 e3 6b 9b d7 55 cd |.k..U.|
[510f 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5110 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004855920 gate 1582330534559215700 evaluation starts
[5111 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004855920 signed by 0 principal evaluation starts (used [false])
[5112 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004855920 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5113 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004855920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5114 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004855920 principal evaluation fails
[5115 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004855920 gate 1582330534559215700 evaluation fails
[5116 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5117 02-22 00:15:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5118 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5119 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 e0 03 bc d5 01 4d b7 cd 21 bc 87 76 65 e9 14 |......M..!..ve..|
00000010 19 71 a0 cd 29 43 4a 33 c2 53 e3 0d f5 9c 48 d3 |.q..)CJ3.S....H.|
[511a 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 23 3b b2 12 a6 0b 9a b1 14 e1 1f |0D. .#;.........|
00000010 e7 4f d5 26 f5 f7 54 ea 62 55 c3 e2 38 d6 7c 06 |.O.&..T.bU..8.|.|
00000020 02 ce 8d 29 02 20 75 e8 8e 8f 78 4d 67 fe 8c 7f |...). u...xMg...|
00000030 aa 91 3f 19 4e 33 b1 06 54 61 e3 a7 98 c0 09 27 |..?.N3..Ta.....'|
00000040 e3 6b 9b d7 55 cd |.k..U.|
[511b 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[511c 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004864220 gate 1582330534560842400 evaluation starts
[511d 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004864220 signed by 0 principal evaluation starts (used [false])
[511e 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004864220 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[511f 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004864220 principal evaluation succeeds for identity 0
[5120 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004864220 gate 1582330534560842400 evaluation succeeds
[5121 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5122 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5123 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5124 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5125 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[5126 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5127 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5128 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[5129 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[512a 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[512b 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[512c 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af d5 05 ea d0 22 0d fc 34 a3 52 28 4a 89 42 cb |....."..4.R(J.B.|
00000010 66 05 2a ae cf aa 55 9b de 8c 6b 32 ed 19 d3 a9 |f.*...U...k2....|
[512d 02-22 00:15:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 51 9c 06 ad 8c ea 93 fb 9b 75 |0E.!..Q........u|
00000010 03 15 70 21 e3 35 ad c3 e6 8d 4e 8d b6 82 ee a8 |..p!.5....N.....|
00000020 ae 6d 7c 99 76 02 20 54 50 77 e3 f0 13 c4 65 5e |.m|.v. TPw....e^|
00000030 7c c6 45 6f b8 d9 e5 e5 92 55 6a a2 5f 68 34 82 ||.Eo.....Uj._h4.|
00000040 95 40 22 22 9c a7 cf |.@""...|
[512e 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[512f 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 f0 6b d7 4c 51 02 e2 d7 3b de |0E.!...k.LQ...;.|
00000010 b8 d7 1d d0 74 9e b5 73 b7 51 37 f9 75 98 88 5a |....t..s.Q7.u..Z|
00000020 cb dc 8b 16 f3 02 20 1d 35 0e 46 a8 b8 cf 8d bb |...... .5.F.....|
00000030 ab bd 0e e9 68 32 0b 3e ea 96 e6 d2 38 ad 60 6d |....h2.>....8.`m|
00000040 c6 32 d4 94 20 11 23 |.2.. .#|
[5130 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5131 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5132 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5133 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5134 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[5135 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[5136 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5137 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[5138 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[5139 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af d5 05 ea d0 22 0d fc 34 a3 52 28 4a 89 42 cb |....."..4.R(J.B.|
00000010 66 05 2a ae cf aa 55 9b de 8c 6b 32 ed 19 d3 a9 |f.*...U...k2....|
[513a 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 51 9c 06 ad 8c ea 93 fb 9b 75 |0E.!..Q........u|
00000010 03 15 70 21 e3 35 ad c3 e6 8d 4e 8d b6 82 ee a8 |..p!.5....N.....|
00000020 ae 6d 7c 99 76 02 20 54 50 77 e3 f0 13 c4 65 5e |.m|.v. TPw....e^|
00000030 7c c6 45 6f b8 d9 e5 e5 92 55 6a a2 5f 68 34 82 ||.Eo.....Uj._h4.|
00000040 95 40 22 22 9c a7 cf |.@""...|
[513b 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes
[513c 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes
[513d 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[513e 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[513f 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 fb 99 58 d5 a0 b9 06 68 9b 90 75 8b 09 c3 96 |D..X....h..u....|
00000010 4a 1c a7 d1 9e 19 7b 85 65 90 8d 8b 0d d9 d2 c1 |J.....{.e.......|
[5140 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 1e f9 38 f2 46 4d a5 21 d5 2d |0E.!....8.FM.!.-|
00000010 37 e5 00 ce c6 af 82 df 51 75 2a 1a 78 f7 46 fe |7.......Qu*.x.F.|
00000020 b1 bf 1f b6 dd 02 20 32 11 1b c2 9b 25 3c f1 00 |...... 2....%<..|
00000030 38 96 0d 4a 78 ee 5b 3f 46 9a 6b 83 cf 23 e0 45 |8..Jx.[?F.k..#.E|
00000040 5c fd bf be b4 c4 ca |\......|
[5141 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes
[5142 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5143 02-22 00:15:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5144 02-22 00:15:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[5145 02-22 00:15:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5146 02-22 00:15:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[5147 02-22 00:15:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[5148 02-22 00:15:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5149 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[514a 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[514b 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[514c 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[514d 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[514e 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[514f 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 ee 57 9e f2 58 1f 41 47 4c 79 7b 9b 35 cf c2 |..W..X.AGLy{.5..|
00000010 ad a2 6b 7f 1c 83 69 0d 23 12 52 4c d0 6a b4 7e |..k...i.#.RL.j.~|
[5150 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 19 ed 85 e6 b5 1d a4 8e 69 b4 e3 |0D. .........i..|
00000010 f3 de 6e d8 7e 65 1c 89 1c 0c 59 a5 dd 4a 6f ab |..n.~e....Y..Jo.|
00000020 16 04 05 95 02 20 43 f6 1a a3 77 11 eb 79 24 db |..... C...w..y$.|
00000030 f0 94 f8 dc 46 65 22 51 4a 47 08 a3 7d d7 6e 07 |....Fe"QJG..}.n.|
00000040 e5 5d 78 c6 2f 4b |.]x./K|
[5151 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5152 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048991e0 gate 1582330534632320000 evaluation starts
[5153 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048991e0 signed by 0 principal evaluation starts (used [false])
[5154 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048991e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5155 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048991e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5156 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048991e0 principal evaluation fails
[5157 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048991e0 gate 1582330534632320000 evaluation fails
[5158 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5159 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[515a 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[515b 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 ee 57 9e f2 58 1f 41 47 4c 79 7b 9b 35 cf c2 |..W..X.AGLy{.5..|
00000010 ad a2 6b 7f 1c 83 69 0d 23 12 52 4c d0 6a b4 7e |..k...i.#.RL.j.~|
[515c 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 19 ed 85 e6 b5 1d a4 8e 69 b4 e3 |0D. .........i..|
00000010 f3 de 6e d8 7e 65 1c 89 1c 0c 59 a5 dd 4a 6f ab |..n.~e....Y..Jo.|
00000020 16 04 05 95 02 20 43 f6 1a a3 77 11 eb 79 24 db |..... C...w..y$.|
00000030 f0 94 f8 dc 46 65 22 51 4a 47 08 a3 7d d7 6e 07 |....Fe"QJG..}.n.|
00000040 e5 5d 78 c6 2f 4b |.]x./K|
[515d 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[515e 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004899ae0 gate 1582330534633865800 evaluation starts
[515f 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004899ae0 signed by 0 principal evaluation starts (used [false])
[5160 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004899ae0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5161 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004899ae0 principal evaluation succeeds for identity 0
[5162 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004899ae0 gate 1582330534633865800 evaluation succeeds
[5163 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5164 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5165 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5166 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5167 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes
[5168 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes]}
[5169 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:65
[516a 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:65
[516b 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[516c 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[516d 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[516e 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[516f 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[5170 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5171 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5172 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5173 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[5174 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[5175 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[5176 02-22 00:15:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5177 02-22 00:15:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151040
[5178 02-22 00:15:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ECF7BAF745726E19D61C70BACD03BBF855BB306C5E75508EFF5C18F67187B84A
[5179 02-22 00:15:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[517a 02-22 00:15:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[517b 02-22 00:15:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[517c 02-22 00:15:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[517d 02-22 00:15:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[517e 02-22 00:15:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[517f 02-22 00:15:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5181 02-22 00:15:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5180 02-22 00:15:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5182 02-22 00:15:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5183 02-22 00:15:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5184 02-22 00:15:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5185 02-22 00:15:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes
[5186 02-22 00:15:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5187 02-22 00:15:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes
[5188 02-22 00:15:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5189 02-22 00:15:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[518a 02-22 00:15:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[518b 02-22 00:15:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[518c 02-22 00:15:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[518f 02-22 00:15:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[518d 02-22 00:15:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[5190 02-22 00:15:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[518e 02-22 00:15:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[5191 02-22 00:15:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5192 02-22 00:15:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[5193 02-22 00:15:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[5194 02-22 00:15:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[5195 02-22 00:15:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[5196 02-22 00:15:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[5197 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5198 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5199 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[519a 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[519b 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[519c 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[519d 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[519e 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[519f 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[51a0 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[51a1 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[51a2 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e15c0 gate 1582330535022370300 evaluation starts
[51a3 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e15c0 signed by 0 principal evaluation starts (used [false])
[51a4 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e15c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[51a5 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e15c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[51a6 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e15c0 principal evaluation fails
[51a7 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e15c0 gate 1582330535022370300 evaluation fails
[51a8 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[51a9 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[51aa 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[51ab 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[51ac 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[51ad 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[51ae 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e1ec0 gate 1582330535023534500 evaluation starts
[51af 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e1ec0 signed by 0 principal evaluation starts (used [false])
[51b0 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e1ec0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[51b1 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e1ec0 principal evaluation succeeds for identity 0
[51b2 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e1ec0 gate 1582330535023534500 evaluation succeeds
[51b3 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[51b4 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[51b5 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[51b6 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[51b7 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[51b8 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[51b9 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[51ba 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[51bb 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[51bc 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[51bd 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[51be 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[51bf 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[51c0 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[51c1 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[51c2 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fd920 gate 1582330535024738100 evaluation starts
[51c3 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fd920 signed by 0 principal evaluation starts (used [false])
[51c4 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fd920 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[51c5 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fd920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[51c6 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fd920 principal evaluation fails
[51c7 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fd920 gate 1582330535024738100 evaluation fails
[51c8 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[51c9 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[51ca 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[51cb 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[51cc 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[51cd 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[51ce 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910220 gate 1582330535025151700 evaluation starts
[51cf 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910220 signed by 0 principal evaluation starts (used [false])
[51d0 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910220 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[51d1 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910220 principal evaluation succeeds for identity 0
[51d2 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910220 gate 1582330535025151700 evaluation succeeds
[51d3 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[51d4 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[51d5 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[51d6 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[51d7 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[51d8 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[51d9 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[51da 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[51db 02-22 00:15:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[51dc 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[51dd 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[51de 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[51df 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[51e0 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[51e1 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[51e2 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[51e3 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[51e4 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[51e5 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[51e6 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004911f30 gate 1582330535034939000 evaluation starts
[51e7 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004911f30 signed by 0 principal evaluation starts (used [false])
[51e8 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004911f30 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[51e9 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004911f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[51ea 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004911f30 principal evaluation fails
[51eb 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004911f30 gate 1582330535034939000 evaluation fails
[51ec 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[51ed 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[51ee 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[51ef 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[51f0 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[51f1 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[51f2 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492c830 gate 1582330535037454200 evaluation starts
[51f3 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492c830 signed by 0 principal evaluation starts (used [false])
[51f4 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492c830 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[51f5 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492c830 principal evaluation succeeds for identity 0
[51f6 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492c830 gate 1582330535037454200 evaluation succeeds
[51f7 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[51f8 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[51f9 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[51fa 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[51fb 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[51fc 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[51fd 02-22 00:15:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[51fe 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[51ff 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5200 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5201 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5202 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5203 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5204 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5205 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5206 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5207 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5208 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5209 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[520a 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948ff0 gate 1582330535040702800 evaluation starts
[520b 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948ff0 signed by 0 principal evaluation starts (used [false])
[520c 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948ff0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[520d 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[520e 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948ff0 principal evaluation fails
[520f 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948ff0 gate 1582330535040702800 evaluation fails
[5210 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5211 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5212 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5213 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5214 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5215 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5216 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049498f0 gate 1582330535043563900 evaluation starts
[5217 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049498f0 signed by 0 principal evaluation starts (used [false])
[5218 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049498f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5219 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049498f0 principal evaluation succeeds for identity 0
[521a 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049498f0 gate 1582330535043563900 evaluation succeeds
[521b 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[521c 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[521d 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[521e 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[521f 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5220 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[5221 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5222 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5223 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5224 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5225 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5226 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5227 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5228 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5229 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[522a 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[522b 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[522c 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[522d 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495d600 gate 1582330535044484600 evaluation starts
[522e 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495d600 signed by 0 principal evaluation starts (used [false])
[522f 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495d600 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5230 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495d600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5231 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495d600 principal evaluation fails
[5232 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495d600 gate 1582330535044484600 evaluation fails
[5233 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5234 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5235 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5236 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5237 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5238 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5239 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495df00 gate 1582330535044891800 evaluation starts
[523a 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495df00 signed by 0 principal evaluation starts (used [false])
[523b 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495df00 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[523c 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495df00 principal evaluation succeeds for identity 0
[523d 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495df00 gate 1582330535044891800 evaluation succeeds
[523e 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[523f 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5240 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5241 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5242 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[5243 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[5244 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5245 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5246 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5247 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5248 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5249 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[524a 02-22 00:15:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[524b 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[524c 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[524d 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[524e 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[524f 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004988010 gate 1582330535051962900 evaluation starts
[5250 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004988010 signed by 0 principal evaluation starts (used [false])
[5251 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004988010 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5252 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004988010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5253 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004988010 principal evaluation fails
[5254 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004988010 gate 1582330535051962900 evaluation fails
[5255 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5256 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5257 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5258 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5259 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[525a 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[525b 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004988910 gate 1582330535052380200 evaluation starts
[525c 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004988910 signed by 0 principal evaluation starts (used [false])
[525d 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004988910 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[525e 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004988910 principal evaluation succeeds for identity 0
[525f 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004988910 gate 1582330535052380200 evaluation succeeds
[5260 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5261 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5262 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5263 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5264 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[5265 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[5266 02-22 00:15:35.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5267 02-22 00:15:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5268 02-22 00:15:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5269 02-22 00:15:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[526a 02-22 00:15:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[526b 02-22 00:15:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[526c 02-22 00:15:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:450229241432681747 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[526d 02-22 00:15:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:450229241432681747 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[526e 02-22 00:15:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[526f 02-22 00:15:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 450229241432681747 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[5270 02-22 00:15:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 450229241432681747 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[5271 02-22 00:15:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5272 02-22 00:15:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[5273 02-22 00:15:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5274 02-22 00:15:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5275 02-22 00:15:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5276 02-22 00:15:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7988933474454925366 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[5277 02-22 00:15:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7988933474454925366 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[5278 02-22 00:15:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[5279 02-22 00:15:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[527a 02-22 00:15:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[527b 02-22 00:15:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[527c 02-22 00:15:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[527d 02-22 00:15:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[527e 02-22 00:15:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[527f 02-22 00:15:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[5280 02-22 00:15:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[5281 02-22 00:15:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5282 02-22 00:15:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5283 02-22 00:15:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5284 02-22 00:15:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5285 02-22 00:15:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:18059520991492885623 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5286 02-22 00:15:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:18059520991492885623 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5287 02-22 00:15:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5288 02-22 00:15:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5289 02-22 00:15:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[528a 02-22 00:15:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[528b 02-22 00:15:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[528c 02-22 00:15:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[528d 02-22 00:15:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[528e 02-22 00:15:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[528f 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[5290 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5291 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[5292 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[5293 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 9f 14 d8 db 3a 5b 5f 9a 3c 41 89 87 17 8b 30 |.....:[_.<A....0|
00000010 d5 c5 c7 d5 cd a5 32 56 87 e6 a5 5c d7 bd ba d8 |......2V...\....|
[5294 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 6a bd 9b 67 b7 9f 78 94 f7 51 |0E.!..j..g..x..Q|
00000010 41 a6 9a 4e 2c 4d 0c 46 da 23 1e a6 04 9f af 13 |A..N,M.F.#......|
00000020 eb 18 01 94 48 02 20 48 e6 bd 88 c3 11 37 d3 36 |....H. H.....7.6|
00000030 6a 40 fb fb a8 73 88 eb f6 e8 79 bd 26 fb a3 77 |j@...s....y.&..w|
00000040 7b bf b1 d3 4d 9a 56 |{...M.V|
[5295 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[5296 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be 7e 84 9b 6f dc 36 a2 7f c0 fa |0E.!..~..o.6....|
00000010 eb ac 70 89 1a 22 1d 54 6e c2 f8 2c e6 fe 5d 27 |..p..".Tn..,..]'|
00000020 06 48 34 ed 71 02 20 32 68 65 65 24 01 5f 3b 4c |.H4.q. 2hee$._;L|
00000030 24 4f 54 96 8a b9 56 d9 4b 97 40 19 da 74 58 09 |$OT...V.K.@..tX.|
00000040 66 b9 11 24 4a 52 7e |f..$JR~|
[5297 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5298 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[5299 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:69
[529a 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:69
[529b 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[529c 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[529d 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[529e 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[529f 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[52a0 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52a1 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52a2 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[52a3 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[52a4 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[52a5 02-22 00:15:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52a6 02-22 00:15:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s
[52a7 02-22 00:15:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:9626521413540455429 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[52a8 02-22 00:15:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:9626521413540455429 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[52a9 02-22 00:15:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:9626521413540455429 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[52aa 02-22 00:15:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52ab 02-22 00:15:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52ac 02-22 00:15:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52ad 02-22 00:15:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52ae 02-22 00:15:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52af 02-22 00:15:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52b0 02-22 00:15:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[52b1 02-22 00:15:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52b2 02-22 00:15:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:8573730337452709185 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[52b3 02-22 00:15:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:8573730337452709185 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[52b4 02-22 00:15:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[52b5 02-22 00:15:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52b6 02-22 00:15:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[52b7 02-22 00:15:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:15453631280315612924 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[52b8 02-22 00:15:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[52b9 02-22 00:15:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:6825928632876346548 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[52ba 02-22 00:15:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[52bb 02-22 00:15:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7000168964046760761 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[52bc 02-22 00:15:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7000168964046760761 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[52bf 02-22 00:15:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52bd 02-22 00:15:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:15453631280315612924 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[52c0 02-22 00:15:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52c1 02-22 00:15:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7000168964046760761 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[52be 02-22 00:15:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:6825928632876346548 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[52c2 02-22 00:15:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7000168964046760761 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[52c3 02-22 00:15:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15453631280315612924 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[52c4 02-22 00:15:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52c5 02-22 00:15:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52c6 02-22 00:15:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15453631280315612924 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[52c7 02-22 00:15:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15453631280315612924 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[52c8 02-22 00:15:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52c9 02-22 00:15:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6825928632876346548 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[52ca 02-22 00:15:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6825928632876346548 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[52cb 02-22 00:15:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52cc 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[52cd 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[52ce 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52cf 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[52d0 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[52d1 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52d2 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[52d3 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[52d4 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[52d5 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[52d6 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[52d7 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[52d8 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 f6 a3 19 0c 69 52 18 2f 84 71 76 d5 3c 73 16 |.....iR./.qv.<s.|
00000010 20 63 a4 11 56 e8 7f fe 63 84 ed 2f a4 5e 47 c8 | c..V...c../.^G.|
[52d9 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 78 3b c6 2c 97 5a 3e 45 c9 99 f5 |0D. yx;.,.Z>E...|
00000010 8c 2b 19 6d dd 9f 88 77 18 45 e5 91 75 bc 1a 41 |.+.m...w.E..u..A|
00000020 37 e3 e1 5c 02 20 68 fb 50 3f 5d 78 2d 6a 28 ac |7..\. h.P?]x-j(.|
00000030 87 6d 0a f4 19 ff f9 c2 13 d1 24 d7 f3 ef 0f 61 |.m........$....a|
00000040 ad 1b 38 90 9e 98 |..8...|
[52da 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[52db 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffaa0 gate 1582330538467993500 evaluation starts
[52dc 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffaa0 signed by 0 principal evaluation starts (used [false])
[52dd 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffaa0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[52de 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffaa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[52df 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffaa0 principal evaluation fails
[52e0 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffaa0 gate 1582330538467993500 evaluation fails
[52e1 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[52e2 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[52e3 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[52e4 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 f6 a3 19 0c 69 52 18 2f 84 71 76 d5 3c 73 16 |.....iR./.qv.<s.|
00000010 20 63 a4 11 56 e8 7f fe 63 84 ed 2f a4 5e 47 c8 | c..V...c../.^G.|
[52e5 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 78 3b c6 2c 97 5a 3e 45 c9 99 f5 |0D. yx;.,.Z>E...|
00000010 8c 2b 19 6d dd 9f 88 77 18 45 e5 91 75 bc 1a 41 |.+.m...w.E..u..A|
00000020 37 e3 e1 5c 02 20 68 fb 50 3f 5d 78 2d 6a 28 ac |7..\. h.P?]x-j(.|
00000030 87 6d 0a f4 19 ff f9 c2 13 d1 24 d7 f3 ef 0f 61 |.m........$....a|
00000040 ad 1b 38 90 9e 98 |..8...|
[52e6 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[52e7 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1e3a0 gate 1582330538469087900 evaluation starts
[52e8 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1e3a0 signed by 0 principal evaluation starts (used [false])
[52e9 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1e3a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[52ea 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1e3a0 principal evaluation succeeds for identity 0
[52eb 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1e3a0 gate 1582330538469087900 evaluation succeeds
[52ec 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[52ed 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[52ee 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[52ef 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[52f0 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes
[52f1 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes]}
[52f2 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:68
[52f3 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:68
[52f4 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[52f5 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52f6 02-22 00:15:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52f7 02-22 00:15:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[52f8 02-22 00:15:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[52f9 02-22 00:15:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52fa 02-22 00:15:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52fb 02-22 00:15:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[52fc 02-22 00:15:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[52fd 02-22 00:15:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[52fe 02-22 00:15:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[52ff 02-22 00:15:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5300 02-22 00:15:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151041
[5301 02-22 00:15:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 71380C67C923E8C8F6BF7B8D9356A84ADE5747A4D7D5D4494187F081B2EC4927
[5302 02-22 00:15:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[5303 02-22 00:15:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[5304 02-22 00:15:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5305 02-22 00:15:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[5306 02-22 00:15:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[5307 02-22 00:15:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5309 02-22 00:15:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[530a 02-22 00:15:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[530b 02-22 00:15:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[530c 02-22 00:15:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[530d 02-22 00:15:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5308 02-22 00:15:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[530e 02-22 00:15:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[530f 02-22 00:15:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[5310 02-22 00:15:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5311 02-22 00:15:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[5312 02-22 00:15:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[5313 02-22 00:15:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 71 38 0c 67 c9 23 e8 c8 f6 bf 7b 8d 93 56 a8 4a |q8.g.#....{..V.J|
00000010 de 57 47 a4 d7 d5 d4 49 41 87 f0 81 b2 ec 49 27 |.WG....IA.....I'|
[5314 02-22 00:15:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 65 02 ad 89 32 30 1d ab eb f9 c6 |0D. Ge...20.....|
00000010 c1 cd 29 a0 ab 36 6c 68 21 d4 4b 4c 0d e0 42 d9 |..)..6lh!.KL..B.|
00000020 d0 4b 05 b8 02 20 08 76 0d a2 d6 e9 d3 94 20 8b |.K... .v...... .|
00000030 88 9d bf d5 dd 7e bb 7f 8f 3f 9b c0 6d 3b 08 bc |.....~...?..m;..|
00000040 68 e8 ce d1 94 95 |h.....|
[5315 02-22 00:15:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[5316 02-22 00:15:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 89 ce c9 58 9a 14 15 c2 94 bc |0E.!.....X......|
00000010 88 78 00 65 e9 45 af 97 a5 64 8e 70 d9 cb 01 61 |.x.e.E...d.p...a|
00000020 99 7d 4a 8e 95 02 20 61 33 5c 68 54 1b 6d cd 29 |.}J... a3\hT.m.)|
00000030 9a ba 5c 60 b2 c5 25 76 f5 50 d4 7c 44 1a 89 6d |..\`..%v.P.|D..m|
00000040 85 0b 16 6b b9 ca ec |...k...|
[5317 02-22 00:15:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5318 02-22 00:15:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5319 02-22 00:15:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[531a 02-22 00:15:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[531b 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[531c 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[531d 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[531e 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[531f 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 71 38 0c 67 c9 23 e8 c8 f6 bf 7b 8d 93 56 a8 4a |q8.g.#....{..V.J|
00000010 de 57 47 a4 d7 d5 d4 49 41 87 f0 81 b2 ec 49 27 |.WG....IA.....I'|
[5320 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 65 02 ad 89 32 30 1d ab eb f9 c6 |0D. Ge...20.....|
00000010 c1 cd 29 a0 ab 36 6c 68 21 d4 4b 4c 0d e0 42 d9 |..)..6lh!.KL..B.|
00000020 d0 4b 05 b8 02 20 08 76 0d a2 d6 e9 d3 94 20 8b |.K... .v...... .|
00000030 88 9d bf d5 dd 7e bb 7f 8f 3f 9b c0 6d 3b 08 bc |.....~...?..m;..|
00000040 68 e8 ce d1 94 95 |h.....|
[5321 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes
[5322 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes
[5323 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5324 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[5325 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 9f 14 d8 db 3a 5b 5f 9a 3c 41 89 87 17 8b 30 |.....:[_.<A....0|
00000010 d5 c5 c7 d5 cd a5 32 56 87 e6 a5 5c d7 bd ba d8 |......2V...\....|
[5326 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 6a bd 9b 67 b7 9f 78 94 f7 51 |0E.!..j..g..x..Q|
00000010 41 a6 9a 4e 2c 4d 0c 46 da 23 1e a6 04 9f af 13 |A..N,M.F.#......|
00000020 eb 18 01 94 48 02 20 48 e6 bd 88 c3 11 37 d3 36 |....H. H.....7.6|
00000030 6a 40 fb fb a8 73 88 eb f6 e8 79 bd 26 fb a3 77 |j@...s....y.&..w|
00000040 7b bf b1 d3 4d 9a 56 |{...M.V|
[5327 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5328 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5329 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[532a 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[532b 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[532c 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[532d 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[532e 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[532f 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5330 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5331 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 f6 a3 19 0c 69 52 18 2f 84 71 76 d5 3c 73 16 |.....iR./.qv.<s.|
00000010 20 63 a4 11 56 e8 7f fe 63 84 ed 2f a4 5e 47 c8 | c..V...c../.^G.|
[5332 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 78 3b c6 2c 97 5a 3e 45 c9 99 f5 |0D. yx;.,.Z>E...|
00000010 8c 2b 19 6d dd 9f 88 77 18 45 e5 91 75 bc 1a 41 |.+.m...w.E..u..A|
00000020 37 e3 e1 5c 02 20 68 fb 50 3f 5d 78 2d 6a 28 ac |7..\. h.P?]x-j(.|
00000030 87 6d 0a f4 19 ff f9 c2 13 d1 24 d7 f3 ef 0f 61 |.m........$....a|
00000040 ad 1b 38 90 9e 98 |..8...|
[5333 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5334 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5f930 gate 1582330538563977900 evaluation starts
[5335 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5f930 signed by 0 principal evaluation starts (used [false])
[5336 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5f930 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5337 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5f930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5338 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5f930 principal evaluation fails
[5339 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5f930 gate 1582330538563977900 evaluation fails
[533a 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[533b 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[533c 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[533d 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 f6 a3 19 0c 69 52 18 2f 84 71 76 d5 3c 73 16 |.....iR./.qv.<s.|
00000010 20 63 a4 11 56 e8 7f fe 63 84 ed 2f a4 5e 47 c8 | c..V...c../.^G.|
[533e 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 78 3b c6 2c 97 5a 3e 45 c9 99 f5 |0D. yx;.,.Z>E...|
00000010 8c 2b 19 6d dd 9f 88 77 18 45 e5 91 75 bc 1a 41 |.+.m...w.E..u..A|
00000020 37 e3 e1 5c 02 20 68 fb 50 3f 5d 78 2d 6a 28 ac |7..\. h.P?]x-j(.|
00000030 87 6d 0a f4 19 ff f9 c2 13 d1 24 d7 f3 ef 0f 61 |.m........$....a|
00000040 ad 1b 38 90 9e 98 |..8...|
[533f 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5340 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a72230 gate 1582330538565603200 evaluation starts
[5341 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a72230 signed by 0 principal evaluation starts (used [false])
[5342 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a72230 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5343 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a72230 principal evaluation succeeds for identity 0
[5344 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a72230 gate 1582330538565603200 evaluation succeeds
[5345 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5346 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5347 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5348 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5349 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes
[534a 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[534b 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[534c 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[534d 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[534e 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[534f 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[5350 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[5351 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5352 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5353 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5354 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5355 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5356 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5357 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5358 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 ee 57 9e f2 58 1f 41 47 4c 79 7b 9b 35 cf c2 |..W..X.AGLy{.5..|
00000010 ad a2 6b 7f 1c 83 69 0d 23 12 52 4c d0 6a b4 7e |..k...i.#.RL.j.~|
[5359 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 19 ed 85 e6 b5 1d a4 8e 69 b4 e3 |0D. .........i..|
00000010 f3 de 6e d8 7e 65 1c 89 1c 0c 59 a5 dd 4a 6f ab |..n.~e....Y..Jo.|
00000020 16 04 05 95 02 20 43 f6 1a a3 77 11 eb 79 24 db |..... C...w..y$.|
00000030 f0 94 f8 dc 46 65 22 51 4a 47 08 a3 7d d7 6e 07 |....Fe"QJG..}.n.|
00000040 e5 5d 78 c6 2f 4b |.]x./K|
[535a 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[535b 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8c350 gate 1582330538568943100 evaluation starts
[535c 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8c350 signed by 0 principal evaluation starts (used [false])
[535d 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8c350 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[535e 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8c350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[535f 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8c350 principal evaluation fails
[5360 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8c350 gate 1582330538568943100 evaluation fails
[5361 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5362 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5363 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5364 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 ee 57 9e f2 58 1f 41 47 4c 79 7b 9b 35 cf c2 |..W..X.AGLy{.5..|
00000010 ad a2 6b 7f 1c 83 69 0d 23 12 52 4c d0 6a b4 7e |..k...i.#.RL.j.~|
[5365 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 19 ed 85 e6 b5 1d a4 8e 69 b4 e3 |0D. .........i..|
00000010 f3 de 6e d8 7e 65 1c 89 1c 0c 59 a5 dd 4a 6f ab |..n.~e....Y..Jo.|
00000020 16 04 05 95 02 20 43 f6 1a a3 77 11 eb 79 24 db |..... C...w..y$.|
00000030 f0 94 f8 dc 46 65 22 51 4a 47 08 a3 7d d7 6e 07 |....Fe"QJG..}.n.|
00000040 e5 5d 78 c6 2f 4b |.]x./K|
[5366 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5367 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8cc50 gate 1582330538569352800 evaluation starts
[5368 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8cc50 signed by 0 principal evaluation starts (used [false])
[5369 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8cc50 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[536a 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8cc50 principal evaluation succeeds for identity 0
[536b 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8cc50 gate 1582330538569352800 evaluation succeeds
[536c 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[536d 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[536e 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[536f 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5370 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes
[5371 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5372 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[5373 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 71 38 0c 67 c9 23 e8 c8 f6 bf 7b 8d 93 56 a8 4a |q8.g.#....{..V.J|
00000010 de 57 47 a4 d7 d5 d4 49 41 87 f0 81 b2 ec 49 27 |.WG....IA.....I'|
[5374 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 65 02 ad 89 32 30 1d ab eb f9 c6 |0D. Ge...20.....|
00000010 c1 cd 29 a0 ab 36 6c 68 21 d4 4b 4c 0d e0 42 d9 |..)..6lh!.KL..B.|
00000020 d0 4b 05 b8 02 20 08 76 0d a2 d6 e9 d3 94 20 8b |.K... .v...... .|
00000030 88 9d bf d5 dd 7e bb 7f 8f 3f 9b c0 6d 3b 08 bc |.....~...?..m;..|
00000040 68 e8 ce d1 94 95 |h.....|
[5375 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes
[5376 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes
[5377 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5378 02-22 00:15:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[5379 02-22 00:15:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 9f 14 d8 db 3a 5b 5f 9a 3c 41 89 87 17 8b 30 |.....:[_.<A....0|
00000010 d5 c5 c7 d5 cd a5 32 56 87 e6 a5 5c d7 bd ba d8 |......2V...\....|
[537a 02-22 00:15:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 6a bd 9b 67 b7 9f 78 94 f7 51 |0E.!..j..g..x..Q|
00000010 41 a6 9a 4e 2c 4d 0c 46 da 23 1e a6 04 9f af 13 |A..N,M.F.#......|
00000020 eb 18 01 94 48 02 20 48 e6 bd 88 c3 11 37 d3 36 |....H. H.....7.6|
00000030 6a 40 fb fb a8 73 88 eb f6 e8 79 bd 26 fb a3 77 |j@...s....y.&..w|
00000040 7b bf b1 d3 4d 9a 56 |{...M.V|
[537b 02-22 00:15:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[537c 02-22 00:15:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[537d 02-22 00:15:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[537e 02-22 00:15:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[537f 02-22 00:15:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5380 02-22 00:15:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[5381 02-22 00:15:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[5382 02-22 00:15:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5383 02-22 00:15:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5384 02-22 00:15:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5385 02-22 00:15:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5386 02-22 00:15:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5387 02-22 00:15:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5388 02-22 00:15:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5389 02-22 00:15:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb ce aa ff 98 bf 1a ec 82 ee 64 50 0f d6 55 2a |..........dP..U*|
00000010 76 09 37 3d 7e 2f be 14 ec 14 2d 4f 34 c7 38 a8 |v.7=~/....-O4.8.|
[538a 02-22 00:15:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 e3 c6 bf 02 ea ed d6 88 bd 52 94 |0D. ..........R.|
00000010 91 73 99 96 b2 72 c8 a2 19 16 cb f2 99 fa 06 cd |.s...r..........|
00000020 80 a3 d6 74 02 20 3d 5c 4a 67 68 44 67 72 15 ac |...t. =\JghDgr..|
00000030 a3 d1 fe 4a 26 e7 c9 7c 9e 93 5d 96 41 d5 84 7d |...J&..|..].A..}|
00000040 21 5a 9b 51 04 55 |!Z.Q.U|
[538b 02-22 00:15:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[538c 02-22 00:15:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab0060 gate 1582330538630088500 evaluation starts
[538d 02-22 00:15:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab0060 signed by 0 principal evaluation starts (used [false])
[538e 02-22 00:15:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab0060 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[538f 02-22 00:15:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab0060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5390 02-22 00:15:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab0060 principal evaluation fails
[5391 02-22 00:15:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab0060 gate 1582330538630088500 evaluation fails
[5392 02-22 00:15:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5393 02-22 00:15:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5394 02-22 00:15:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5395 02-22 00:15:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb ce aa ff 98 bf 1a ec 82 ee 64 50 0f d6 55 2a |..........dP..U*|
00000010 76 09 37 3d 7e 2f be 14 ec 14 2d 4f 34 c7 38 a8 |v.7=~/....-O4.8.|
[5396 02-22 00:15:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 e3 c6 bf 02 ea ed d6 88 bd 52 94 |0D. ..........R.|
00000010 91 73 99 96 b2 72 c8 a2 19 16 cb f2 99 fa 06 cd |.s...r..........|
00000020 80 a3 d6 74 02 20 3d 5c 4a 67 68 44 67 72 15 ac |...t. =\JghDgr..|
00000030 a3 d1 fe 4a 26 e7 c9 7c 9e 93 5d 96 41 d5 84 7d |...J&..|..].A..}|
00000040 21 5a 9b 51 04 55 |!Z.Q.U|
[5397 02-22 00:15:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5398 02-22 00:15:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab0960 gate 1582330538641666700 evaluation starts
[5399 02-22 00:15:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab0960 signed by 0 principal evaluation starts (used [false])
[539a 02-22 00:15:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab0960 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[539b 02-22 00:15:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab0960 principal evaluation succeeds for identity 0
[539c 02-22 00:15:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab0960 gate 1582330538641666700 evaluation succeeds
[539d 02-22 00:15:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[539e 02-22 00:15:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[539f 02-22 00:15:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[53a0 02-22 00:15:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[53a1 02-22 00:15:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[53a2 02-22 00:15:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes]}
[53a3 02-22 00:15:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:66
[53a4 02-22 00:15:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:66
[53a5 02-22 00:15:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[53a6 02-22 00:15:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[53a7 02-22 00:15:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[53a8 02-22 00:15:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[53a9 02-22 00:15:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[53aa 02-22 00:15:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[53ab 02-22 00:15:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[53ac 02-22 00:15:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[53ad 02-22 00:15:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[53ae 02-22 00:15:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[53af 02-22 00:15:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[53b0 02-22 00:15:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[53b1 02-22 00:15:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[53b2 02-22 00:15:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[53b3 02-22 00:15:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[53b4 02-22 00:15:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[53b5 02-22 00:15:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[53b6 02-22 00:15:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[53b7 02-22 00:15:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[53b8 02-22 00:15:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[53b9 02-22 00:15:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[53ba 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[53bb 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[53bc 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[53bd 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[53be 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[53bf 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[53c0 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[53c1 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[53c2 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[53c3 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[53c4 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[53c5 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[53c6 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[53c7 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[53c8 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8f40 gate 1582330539015057400 evaluation starts
[53c9 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8f40 signed by 0 principal evaluation starts (used [false])
[53ca 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8f40 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[53cb 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[53cc 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8f40 principal evaluation fails
[53cd 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8f40 gate 1582330539015057400 evaluation fails
[53ce 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[53cf 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[53d0 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[53d1 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[53d2 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[53d3 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[53d4 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad9840 gate 1582330539016407200 evaluation starts
[53d5 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad9840 signed by 0 principal evaluation starts (used [false])
[53d6 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad9840 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[53d7 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad9840 principal evaluation succeeds for identity 0
[53d8 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad9840 gate 1582330539016407200 evaluation succeeds
[53d9 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[53da 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[53db 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[53dc 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[53dd 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[53de 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[53df 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[53e0 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[53e1 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[53e2 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[53e3 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[53e4 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[53e5 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[53e6 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[53e7 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[53e8 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[53e9 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[53ea 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af1950 gate 1582330539019366700 evaluation starts
[53eb 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af1950 signed by 0 principal evaluation starts (used [false])
[53ec 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af1950 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[53ed 02-22 00:15:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af1950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[53ee 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af1950 principal evaluation fails
[53ef 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af1950 gate 1582330539019366700 evaluation fails
[53f0 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[53f1 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[53f2 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[53f3 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[53f4 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[53f5 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[53f6 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b02250 gate 1582330539023943100 evaluation starts
[53f7 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b02250 signed by 0 principal evaluation starts (used [false])
[53f8 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b02250 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[53f9 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b02250 principal evaluation succeeds for identity 0
[53fa 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b02250 gate 1582330539023943100 evaluation succeeds
[53fb 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[53fc 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[53fd 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[53fe 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[53ff 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[5400 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[5401 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5402 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[5403 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[5404 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[5405 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[5406 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[5407 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5408 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5409 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[540a 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[540b 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[540c 02-22 00:15:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[540d 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[540e 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[540f 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5410 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5411 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5412 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1f2a0 gate 1582330539030807500 evaluation starts
[5413 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1f2a0 signed by 0 principal evaluation starts (used [false])
[5414 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1f2a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5415 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1f2a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5416 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1f2a0 principal evaluation fails
[5417 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1f2a0 gate 1582330539030807500 evaluation fails
[5418 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5419 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[541a 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[541b 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[541c 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[541d 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[541e 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1fba0 gate 1582330539031910700 evaluation starts
[541f 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1fba0 signed by 0 principal evaluation starts (used [false])
[5420 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1fba0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5421 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1fba0 principal evaluation succeeds for identity 0
[5422 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1fba0 gate 1582330539031910700 evaluation succeeds
[5423 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5424 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5425 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5426 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5427 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5428 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5429 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[542a 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[542b 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[542c 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[542d 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[542e 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[542f 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5430 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5431 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5432 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b37600 gate 1582330539033420000 evaluation starts
[5433 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b37600 signed by 0 principal evaluation starts (used [false])
[5434 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b37600 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5435 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b37600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5436 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b37600 principal evaluation fails
[5437 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b37600 gate 1582330539033420000 evaluation fails
[5438 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5439 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[543a 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[543b 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[543c 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[543d 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[543e 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b37f00 gate 1582330539036471700 evaluation starts
[543f 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b37f00 signed by 0 principal evaluation starts (used [false])
[5440 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b37f00 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5441 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b37f00 principal evaluation succeeds for identity 0
[5442 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b37f00 gate 1582330539036471700 evaluation succeeds
[5443 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5444 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5445 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5446 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5447 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5448 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[5449 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[544a 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[544b 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[544c 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[544d 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[544e 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[544f 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5450 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5451 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5452 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5453 02-22 00:15:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5454 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5455 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4fc10 gate 1582330539043084300 evaluation starts
[5456 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4fc10 signed by 0 principal evaluation starts (used [false])
[5457 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4fc10 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5458 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4fc10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5459 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4fc10 principal evaluation fails
[545a 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4fc10 gate 1582330539043084300 evaluation fails
[545b 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[545c 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[545d 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[545e 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[545f 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5460 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5461 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6e510 gate 1582330539045294000 evaluation starts
[5462 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6e510 signed by 0 principal evaluation starts (used [false])
[5463 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6e510 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5464 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6e510 principal evaluation succeeds for identity 0
[5465 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6e510 gate 1582330539045294000 evaluation succeeds
[5466 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5467 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5468 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5469 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[546a 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[546b 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[546c 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[546d 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[546e 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[546f 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5470 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5471 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5472 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5473 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5474 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5475 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5476 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5477 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5478 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5479 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b7ecd0 gate 1582330539049785300 evaluation starts
[547a 02-22 00:15:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b7ecd0 signed by 0 principal evaluation starts (used [false])
[547b 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b7ecd0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[547c 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b7ecd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[547d 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b7ecd0 principal evaluation fails
[547e 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b7ecd0 gate 1582330539049785300 evaluation fails
[547f 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5480 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5481 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5482 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5483 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5484 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5485 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b7f5d0 gate 1582330539051301900 evaluation starts
[5486 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b7f5d0 signed by 0 principal evaluation starts (used [false])
[5487 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b7f5d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5488 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b7f5d0 principal evaluation succeeds for identity 0
[5489 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b7f5d0 gate 1582330539051301900 evaluation succeeds
[548a 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[548b 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[548c 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[548d 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[548e 02-22 00:15:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[548f 02-22 00:15:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5490 02-22 00:15:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5491 02-22 00:15:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[5492 02-22 00:15:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5493 02-22 00:15:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5494 02-22 00:15:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7476241670853630348 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[5495 02-22 00:15:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7476241670853630348 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[5496 02-22 00:15:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5497 02-22 00:15:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 7476241670853630348 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[5498 02-22 00:15:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 7476241670853630348 , Msg_type: BLOCK_MSG, digests: [2 1], Envelope: 39 bytes, Signature: 0 bytes
[5499 02-22 00:15:39.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[549a 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes
[549b 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[549c 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes
[549d 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[549e 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[549f 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 14 eb 5e ef 9f f4 8f af 3e 57 1e 76 ab 17 27 |;..^.....>W.v..'|
00000010 b7 0a 25 a4 9e f8 6a 2d ae 26 a8 0b 8c ab 71 07 |..%...j-.&....q.|
[54a0 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 ef 80 4e 5d f6 f9 24 1f 81 1c |0E.!....N]..$...|
00000010 a1 95 5b 58 26 2f 83 c9 71 66 3c 0b a5 b6 31 00 |..[X&/..qf<...1.|
00000020 f2 02 18 0f 56 02 20 2c 5a 9b fe 55 c4 68 0f 63 |....V. ,Z..U.h.c|
00000030 5f da 1c 61 37 83 e2 33 8b 30 fa 9c df 18 ba 8e |_..a7..3.0......|
00000040 9d dc 7f 69 7b 57 5d |...i{W]|
[54a1 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes
[54a2 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes]}
[54a3 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:70
[54a4 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:70
[54a5 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[54a6 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54a7 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54a8 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54a9 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[54aa 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54ab 02-22 00:15:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54ac 02-22 00:15:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes
[54ad 02-22 00:15:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes
[54ae 02-22 00:15:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54af 02-22 00:15:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes
[54b0 02-22 00:15:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54b1 02-22 00:15:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54b2 02-22 00:15:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54b3 02-22 00:15:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[54b4 02-22 00:15:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54b5 02-22 00:15:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[54b6 02-22 00:15:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes
[54b7 02-22 00:15:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54b8 02-22 00:15:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes
[54b9 02-22 00:15:39.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54ba 02-22 00:15:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[54bb 02-22 00:15:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[54bc 02-22 00:15:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54bd 02-22 00:15:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[54be 02-22 00:15:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[54bf 02-22 00:15:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54c0 02-22 00:15:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[54c1 02-22 00:15:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[54c2 02-22 00:15:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[54c3 02-22 00:15:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[54c4 02-22 00:15:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[54c5 02-22 00:15:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[54c6 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 4d 77 d1 f1 da 44 96 a8 9d 75 93 29 c6 37 3c |3Mw...D...u.).7<|
00000010 2e 1a 7c 82 4b 56 9e 9f f8 28 54 8f 23 01 f3 64 |..|.KV...(T.#..d|
[54c7 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 39 42 79 bb 96 7b ec fb 21 b2 |0E.!..9By..{..!.|
00000010 5f c5 4a 49 8a 23 18 a0 17 98 f6 91 61 4b 70 9e |_.JI.#......aKp.|
00000020 4d 18 cb 2f 52 02 20 5b 23 51 73 43 02 77 c5 c8 |M../R. [#QsC.w..|
00000030 1b c1 86 81 08 76 ad 55 0f bf 90 63 de 6a d8 53 |.....v.U...c.j.S|
00000040 cc 8c 8e 66 96 84 84 |...f...|
[54c8 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[54c9 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcc0d0 gate 1582330539291391700 evaluation starts
[54ca 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcc0d0 signed by 0 principal evaluation starts (used [false])
[54cb 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcc0d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[54cc 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcc0d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[54cd 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcc0d0 principal evaluation fails
[54ce 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcc0d0 gate 1582330539291391700 evaluation fails
[54cf 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[54d0 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[54d1 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[54d2 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 4d 77 d1 f1 da 44 96 a8 9d 75 93 29 c6 37 3c |3Mw...D...u.).7<|
00000010 2e 1a 7c 82 4b 56 9e 9f f8 28 54 8f 23 01 f3 64 |..|.KV...(T.#..d|
[54d3 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 39 42 79 bb 96 7b ec fb 21 b2 |0E.!..9By..{..!.|
00000010 5f c5 4a 49 8a 23 18 a0 17 98 f6 91 61 4b 70 9e |_.JI.#......aKp.|
00000020 4d 18 cb 2f 52 02 20 5b 23 51 73 43 02 77 c5 c8 |M../R. [#QsC.w..|
00000030 1b c1 86 81 08 76 ad 55 0f bf 90 63 de 6a d8 53 |.....v.U...c.j.S|
00000040 cc 8c 8e 66 96 84 84 |...f...|
[54d4 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[54d5 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcc9d0 gate 1582330539291836300 evaluation starts
[54d6 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcc9d0 signed by 0 principal evaluation starts (used [false])
[54d7 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcc9d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[54d8 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcc9d0 principal evaluation succeeds for identity 0
[54d9 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcc9d0 gate 1582330539291836300 evaluation succeeds
[54da 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[54db 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[54dc 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[54dd 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[54de 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[54df 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[54e0 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes]}
[54e1 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:69
[54e2 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:69
[54e3 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[54e4 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54e5 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54e6 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54e7 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[54e8 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54e9 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54ea 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54eb 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54ec 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54ed 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54ee 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54ef 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54f0 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54f1 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[54f2 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[54f3 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[54f4 02-22 00:15:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54f5 02-22 00:15:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[54f6 02-22 00:15:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[54f7 02-22 00:15:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54f8 02-22 00:15:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[54f9 02-22 00:15:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54fa 02-22 00:15:39.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[54fb 02-22 00:15:39.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[54fc 02-22 00:15:39.32 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[54fd 02-22 00:15:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[54fe 02-22 00:15:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510181801
[54ff 02-22 00:15:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D802B39AEE13CACA832279548762214F25D9E99A145A09D40C6CEF1D32A0C9F1
[5500 02-22 00:15:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[5501 02-22 00:15:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5502 02-22 00:15:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5503 02-22 00:15:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5504 02-22 00:15:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5505 02-22 00:15:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:24 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[5506 02-22 00:15:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5508 02-22 00:15:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5507 02-22 00:15:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:24 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[5509 02-22 00:15:39.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[550a 02-22 00:15:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[550b 02-22 00:15:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[550c 02-22 00:15:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[550d 02-22 00:15:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[550e 02-22 00:15:39.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[550f 02-22 00:15:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5510 02-22 00:15:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5511 02-22 00:15:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5512 02-22 00:15:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5513 02-22 00:15:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5514 02-22 00:15:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5515 02-22 00:15:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4c 75 54 a3 87 cc 2b a4 74 08 1f e4 c4 f6 06 d5 |LuT...+.t.......|
00000010 43 85 4c 13 b4 0f cd af ab df 63 42 f2 e5 ca 51 |C.L.......cB...Q|
[5516 02-22 00:15:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 1a b2 01 df 7d 20 de f5 a0 af 5e |0D. .....} ....^|
00000010 71 f1 3a 7f fe ca 9c cd f1 24 3d 0c 2b 5e 1a c8 |q.:......$=.+^..|
00000020 4c ba 0d 72 02 20 43 fe f4 36 0a 29 68 d6 bf fd |L..r. C..6.)h...|
00000030 7c e4 c7 03 46 5f 32 18 e5 ea b5 fb 6a 77 2a c0 ||...F_2.....jw*.|
00000040 bf 91 2f 7c 87 80 |../|..|
[5517 02-22 00:15:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5518 02-22 00:15:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0e090 gate 1582330539388817400 evaluation starts
[5519 02-22 00:15:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0e090 signed by 0 principal evaluation starts (used [false])
[551a 02-22 00:15:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0e090 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[551b 02-22 00:15:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0e090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[551c 02-22 00:15:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0e090 principal evaluation fails
[551d 02-22 00:15:39.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0e090 gate 1582330539388817400 evaluation fails
[551e 02-22 00:15:39.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[551f 02-22 00:15:39.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5520 02-22 00:15:39.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[5521 02-22 00:15:39.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5522 02-22 00:15:39.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4c 75 54 a3 87 cc 2b a4 74 08 1f e4 c4 f6 06 d5 |LuT...+.t.......|
00000010 43 85 4c 13 b4 0f cd af ab df 63 42 f2 e5 ca 51 |C.L.......cB...Q|
[5523 02-22 00:15:39.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 1a b2 01 df 7d 20 de f5 a0 af 5e |0D. .....} ....^|
00000010 71 f1 3a 7f fe ca 9c cd f1 24 3d 0c 2b 5e 1a c8 |q.:......$=.+^..|
00000020 4c ba 0d 72 02 20 43 fe f4 36 0a 29 68 d6 bf fd |L..r. C..6.)h...|
00000030 7c e4 c7 03 46 5f 32 18 e5 ea b5 fb 6a 77 2a c0 ||...F_2.....jw*.|
00000040 bf 91 2f 7c 87 80 |../|..|
[5524 02-22 00:15:39.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5525 02-22 00:15:39.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0e990 gate 1582330539408261100 evaluation starts
[5526 02-22 00:15:39.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0e990 signed by 0 principal evaluation starts (used [false])
[5527 02-22 00:15:39.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0e990 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5528 02-22 00:15:39.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0e990 principal evaluation succeeds for identity 0
[5529 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0e990 gate 1582330539408261100 evaluation succeeds
[552a 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[552b 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[552c 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[552d 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[552e 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[552f 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes]}
[5530 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:67
[5531 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:67
[5532 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[5533 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5534 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5535 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5536 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[5538 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5537 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[553a 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[553b 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5539 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[553c 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[553d 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[553e 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[553f 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5540 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5541 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5543 02-22 00:15:39.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5542 02-22 00:15:39.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[5544 02-22 00:15:39.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5545 02-22 00:15:39.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[5546 02-22 00:15:39.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5547 02-22 00:15:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[5548 02-22 00:15:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[5549 02-22 00:15:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[554a 02-22 00:15:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[554b 02-22 00:15:39.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[554c 02-22 00:15:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[554d 02-22 00:15:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[554e 02-22 00:15:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[554f 02-22 00:15:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5550 02-22 00:15:39.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151042
[5551 02-22 00:15:39.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6B63D0CCA23ABD69D55FB2E095447CB212DF7561BC0F55E237D39AC59092271E
[5552 02-22 00:15:39.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[5553 02-22 00:15:39.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[5554 02-22 00:15:39.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[5555 02-22 00:15:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5556 02-22 00:15:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5557 02-22 00:15:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5558 02-22 00:15:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5559 02-22 00:15:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[555b 02-22 00:15:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[555a 02-22 00:15:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[555d 02-22 00:15:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[555e 02-22 00:15:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes
[555f 02-22 00:15:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[555c 02-22 00:15:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[5560 02-22 00:15:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5561 02-22 00:15:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5562 02-22 00:15:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11120046761682515532 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[5563 02-22 00:15:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11120046761682515532 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[5564 02-22 00:15:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[5565 02-22 00:15:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5566 02-22 00:15:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[5567 02-22 00:15:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5568 02-22 00:15:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5569 02-22 00:15:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[556a 02-22 00:15:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[556b 02-22 00:15:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[556c 02-22 00:15:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[556d 02-22 00:15:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[556e 02-22 00:15:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[556f 02-22 00:15:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5570 02-22 00:15:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5571 02-22 00:15:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:11288955286643435164 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5572 02-22 00:15:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:11288955286643435164 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5573 02-22 00:15:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5574 02-22 00:15:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5575 02-22 00:15:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5576 02-22 00:15:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5577 02-22 00:15:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5578 02-22 00:15:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5579 02-22 00:15:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[557a 02-22 00:15:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[557b 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[557c 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[557d 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[557e 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[557f 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 5b 44 db bc ba a4 53 5d 41 1f a6 da 5f 0e 2b |s[D....S]A..._.+|
00000010 27 f7 e5 e4 9a da e5 a9 00 3f 92 a6 da 15 ac 38 |'........?.....8|
[5580 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 95 8f a3 21 b4 e2 88 0f cd 44 48 |0D. e...!.....DH|
00000010 91 d9 62 e4 5f 63 06 f0 44 79 21 5c 76 d9 89 bc |..b._c..Dy!\v...|
00000020 02 ba 04 f7 02 20 55 93 3c d4 16 ca db 8d 22 81 |..... U.<.....".|
00000030 be 8b 61 a8 d3 df f4 4c db bd 38 c7 ae fc 02 dd |..a....L..8.....|
00000040 0c b8 20 5f ea 6d |.. _.m|
[5581 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[5582 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 63 46 45 85 43 82 01 59 24 c3 a0 |0D. .cFE.C..Y$..|
00000010 84 34 f4 75 62 e5 2f d7 68 79 26 9a 2b a6 ad 60 |.4.ub./.hy&.+..`|
00000020 8b ec 3f 18 02 20 36 00 14 57 66 59 f1 65 92 7f |..?.. 6..WfY.e..|
00000030 18 0a 16 18 fb da e6 25 c3 71 5f 2a d6 67 0e a4 |.......%.q_*.g..|
00000040 e3 70 07 c1 98 cc |.p....|
[5583 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5584 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[5585 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:71
[5586 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:71
[5587 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[5588 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5589 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[558a 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[558b 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[558c 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[558d 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[558e 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[558f 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[5590 02-22 00:15:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[5591 02-22 00:15:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5592 02-22 00:15:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:12640911209137825736 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5593 02-22 00:15:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:12640911209137825736 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5594 02-22 00:15:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:12640911209137825736 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5595 02-22 00:15:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5596 02-22 00:15:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5597 02-22 00:15:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5598 02-22 00:15:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5599 02-22 00:15:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[559a 02-22 00:15:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[559b 02-22 00:15:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[559c 02-22 00:15:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[559d 02-22 00:15:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:1333136680983448409 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[559e 02-22 00:15:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1333136680983448409 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[559f 02-22 00:15:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[55a0 02-22 00:15:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55a1 02-22 00:15:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[55a2 02-22 00:15:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7420758334296166810 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[55a3 02-22 00:15:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[55a4 02-22 00:15:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7420758334296166810 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[55a6 02-22 00:15:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55a5 02-22 00:15:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:3601003631309547578 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[55a7 02-22 00:15:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[55a8 02-22 00:15:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:18056977737474547221 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[55a9 02-22 00:15:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:18056977737474547221 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[55aa 02-22 00:15:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55ab 02-22 00:15:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:3601003631309547578 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[55ac 02-22 00:15:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55ad 02-22 00:15:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18056977737474547221 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[55af 02-22 00:15:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18056977737474547221 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[55b0 02-22 00:15:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55ae 02-22 00:15:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3601003631309547578 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[55b1 02-22 00:15:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3601003631309547578 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[55b2 02-22 00:15:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3601003631309547578 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[55b3 02-22 00:15:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55b4 02-22 00:15:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7420758334296166810 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[55b5 02-22 00:15:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7420758334296166810 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[55b6 02-22 00:15:42.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55b7 02-22 00:15:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[55b8 02-22 00:15:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[55b9 02-22 00:15:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55ba 02-22 00:15:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[55bb 02-22 00:15:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[55bc 02-22 00:15:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55bd 02-22 00:15:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[55be 02-22 00:15:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[55bf 02-22 00:15:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[55c0 02-22 00:15:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[55c1 02-22 00:15:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[55c2 02-22 00:15:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[55c3 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 ee 96 45 4f 07 ba 7a 35 c3 ee af 0f f0 67 7f |...EO..z5.....g.|
00000010 d6 b2 4d 43 de 3d 37 9d 11 41 ee 3e 2b 9a 33 7c |..MC.=7..A.>+.3||
[55c4 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 e4 e1 47 9e fb 01 af b8 72 52 fc |0D. F..G.....rR.|
00000010 92 79 30 d4 e0 45 4a 8a eb 20 fc 01 e3 36 6d 9f |.y0..EJ.. ...6m.|
00000020 89 1f 5a b3 02 20 57 0a 9b 0f b2 34 7f 3c 1e 7e |..Z.. W....4.<.~|
00000030 5f b9 77 98 24 8c fc d9 af d2 2e f1 69 55 2a 04 |_.w.$.......iU*.|
00000040 63 ed dd 29 a4 0c |c..)..|
[55c5 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[55c6 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cad980 gate 1582330542470561900 evaluation starts
[55c7 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cad980 signed by 0 principal evaluation starts (used [false])
[55c8 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cad980 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[55c9 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cad980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[55ca 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cad980 principal evaluation fails
[55cb 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cad980 gate 1582330542470561900 evaluation fails
[55cc 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[55cd 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[55ce 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[55cf 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 ee 96 45 4f 07 ba 7a 35 c3 ee af 0f f0 67 7f |...EO..z5.....g.|
00000010 d6 b2 4d 43 de 3d 37 9d 11 41 ee 3e 2b 9a 33 7c |..MC.=7..A.>+.3||
[55d0 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 e4 e1 47 9e fb 01 af b8 72 52 fc |0D. F..G.....rR.|
00000010 92 79 30 d4 e0 45 4a 8a eb 20 fc 01 e3 36 6d 9f |.y0..EJ.. ...6m.|
00000020 89 1f 5a b3 02 20 57 0a 9b 0f b2 34 7f 3c 1e 7e |..Z.. W....4.<.~|
00000030 5f b9 77 98 24 8c fc d9 af d2 2e f1 69 55 2a 04 |_.w.$.......iU*.|
00000040 63 ed dd 29 a4 0c |c..)..|
[55d1 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[55d2 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc6280 gate 1582330542473607300 evaluation starts
[55d3 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc6280 signed by 0 principal evaluation starts (used [false])
[55d4 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc6280 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[55d5 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc6280 principal evaluation succeeds for identity 0
[55d6 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc6280 gate 1582330542473607300 evaluation succeeds
[55d7 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[55d8 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[55d9 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[55da 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[55db 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes
[55dc 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes]}
[55dd 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:70
[55de 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:70
[55df 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[55e0 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55e1 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55e2 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55e3 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[55e4 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55e5 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55e6 02-22 00:15:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55e7 02-22 00:15:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[55e8 02-22 00:15:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[55e9 02-22 00:15:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[55ea 02-22 00:15:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55eb 02-22 00:15:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151043
[55ec 02-22 00:15:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C6C2E0F483FE523D684C438443B6F10DC460D84920FE1A7ED2BFDC44F6D803C4
[55ed 02-22 00:15:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[55ee 02-22 00:15:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[55ef 02-22 00:15:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[55f0 02-22 00:15:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55f1 02-22 00:15:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[55f2 02-22 00:15:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[55f4 02-22 00:15:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55f5 02-22 00:15:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[55f6 02-22 00:15:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55f3 02-22 00:15:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[55f7 02-22 00:15:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[55f8 02-22 00:15:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[55f9 02-22 00:15:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[55fa 02-22 00:15:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[55fb 02-22 00:15:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[55fc 02-22 00:15:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[55fd 02-22 00:15:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[55fe 02-22 00:15:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 c2 e0 f4 83 fe 52 3d 68 4c 43 84 43 b6 f1 0d |......R=hLC.C...|
00000010 c4 60 d8 49 20 fe 1a 7e d2 bf dc 44 f6 d8 03 c4 |.`.I ..~...D....|
[55ff 02-22 00:15:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 45 80 78 8d 69 b0 67 dc d5 1c 4f |0D. .E.x.i.g...O|
00000010 3e 8f 67 fc d2 32 f7 b4 c7 32 89 cd a7 89 de 2d |>.g..2...2.....-|
00000020 fe 98 8d e6 02 20 72 35 43 4a e8 99 87 2c 92 bb |..... r5CJ...,..|
00000030 89 3d f6 9f 8d be f1 cc f9 85 68 da 73 4e 92 fb |.=........h.sN..|
00000040 76 95 55 d1 7a ae |v.U.z.|
[5600 02-22 00:15:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[5602 02-22 00:15:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[5603 02-22 00:15:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5604 02-22 00:15:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[5605 02-22 00:15:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 5b 44 db bc ba a4 53 5d 41 1f a6 da 5f 0e 2b |s[D....S]A..._.+|
00000010 27 f7 e5 e4 9a da e5 a9 00 3f 92 a6 da 15 ac 38 |'........?.....8|
[5606 02-22 00:15:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 95 8f a3 21 b4 e2 88 0f cd 44 48 |0D. e...!.....DH|
00000010 91 d9 62 e4 5f 63 06 f0 44 79 21 5c 76 d9 89 bc |..b._c..Dy!\v...|
00000020 02 ba 04 f7 02 20 55 93 3c d4 16 ca db 8d 22 81 |..... U.<.....".|
00000030 be 8b 61 a8 d3 df f4 4c db bd 38 c7 ae fc 02 dd |..a....L..8.....|
00000040 0c b8 20 5f ea 6d |.. _.m|
[5607 02-22 00:15:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5608 02-22 00:15:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5601 02-22 00:15:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5609 02-22 00:15:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[560a 02-22 00:15:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[560b 02-22 00:15:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[560c 02-22 00:15:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[560d 02-22 00:15:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[560e 02-22 00:15:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 c2 e0 f4 83 fe 52 3d 68 4c 43 84 43 b6 f1 0d |......R=hLC.C...|
00000010 c4 60 d8 49 20 fe 1a 7e d2 bf dc 44 f6 d8 03 c4 |.`.I ..~...D....|
[560f 02-22 00:15:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 45 80 78 8d 69 b0 67 dc d5 1c 4f |0D. .E.x.i.g...O|
00000010 3e 8f 67 fc d2 32 f7 b4 c7 32 89 cd a7 89 de 2d |>.g..2...2.....-|
00000020 fe 98 8d e6 02 20 72 35 43 4a e8 99 87 2c 92 bb |..... r5CJ...,..|
00000030 89 3d f6 9f 8d be f1 cc f9 85 68 da 73 4e 92 fb |.=........h.sN..|
00000040 76 95 55 d1 7a ae |v.U.z.|
[5610 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[5611 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 2f c0 7d 16 a1 4b bb f1 95 dd 2e |0D. ./.}..K.....|
00000010 92 f0 24 93 36 ee 02 3d fc b3 b3 d5 24 e4 33 f4 |..$.6..=....$.3.|
00000020 df 87 96 46 02 20 44 d3 49 cc 02 99 28 a5 5d cc |...F. D.I...(.].|
00000030 da 9a ce 51 82 9b 4f 8d 6f 54 09 b7 62 e8 bb ee |...Q..O.oT..b...|
00000040 32 27 44 6d 61 9d |2'Dma.|
[5612 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5613 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5614 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5615 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5616 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[5617 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5618 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[5619 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[561a 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 c2 e0 f4 83 fe 52 3d 68 4c 43 84 43 b6 f1 0d |......R=hLC.C...|
00000010 c4 60 d8 49 20 fe 1a 7e d2 bf dc 44 f6 d8 03 c4 |.`.I ..~...D....|
[561b 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 45 80 78 8d 69 b0 67 dc d5 1c 4f |0D. .E.x.i.g...O|
00000010 3e 8f 67 fc d2 32 f7 b4 c7 32 89 cd a7 89 de 2d |>.g..2...2.....-|
00000020 fe 98 8d e6 02 20 72 35 43 4a e8 99 87 2c 92 bb |..... r5CJ...,..|
00000030 89 3d f6 9f 8d be f1 cc f9 85 68 da 73 4e 92 fb |.=........h.sN..|
00000040 76 95 55 d1 7a ae |v.U.z.|
[561c 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[561d 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes
[561e 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[561f 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[5620 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 5b 44 db bc ba a4 53 5d 41 1f a6 da 5f 0e 2b |s[D....S]A..._.+|
00000010 27 f7 e5 e4 9a da e5 a9 00 3f 92 a6 da 15 ac 38 |'........?.....8|
[5621 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 95 8f a3 21 b4 e2 88 0f cd 44 48 |0D. e...!.....DH|
00000010 91 d9 62 e4 5f 63 06 f0 44 79 21 5c 76 d9 89 bc |..b._c..Dy!\v...|
00000020 02 ba 04 f7 02 20 55 93 3c d4 16 ca db 8d 22 81 |..... U.<.....".|
00000030 be 8b 61 a8 d3 df f4 4c db bd 38 c7 ae fc 02 dd |..a....L..8.....|
00000040 0c b8 20 5f ea 6d |.. _.m|
[5622 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes
[5623 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5624 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[5625 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5626 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5627 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5628 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5629 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[562a 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[562b 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[562c 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 ee 96 45 4f 07 ba 7a 35 c3 ee af 0f f0 67 7f |...EO..z5.....g.|
00000010 d6 b2 4d 43 de 3d 37 9d 11 41 ee 3e 2b 9a 33 7c |..MC.=7..A.>+.3||
[562d 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 e4 e1 47 9e fb 01 af b8 72 52 fc |0D. F..G.....rR.|
00000010 92 79 30 d4 e0 45 4a 8a eb 20 fc 01 e3 36 6d 9f |.y0..EJ.. ...6m.|
00000020 89 1f 5a b3 02 20 57 0a 9b 0f b2 34 7f 3c 1e 7e |..Z.. W....4.<.~|
00000030 5f b9 77 98 24 8c fc d9 af d2 2e f1 69 55 2a 04 |_.w.$.......iU*.|
00000040 63 ed dd 29 a4 0c |c..)..|
[562e 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[562f 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d19770 gate 1582330542578869000 evaluation starts
[5630 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d19770 signed by 0 principal evaluation starts (used [false])
[5631 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d19770 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5632 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d19770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5633 02-22 00:15:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d19770 principal evaluation fails
[5634 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d19770 gate 1582330542578869000 evaluation fails
[5635 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5636 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5637 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5638 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 ee 96 45 4f 07 ba 7a 35 c3 ee af 0f f0 67 7f |...EO..z5.....g.|
00000010 d6 b2 4d 43 de 3d 37 9d 11 41 ee 3e 2b 9a 33 7c |..MC.=7..A.>+.3||
[5639 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 e4 e1 47 9e fb 01 af b8 72 52 fc |0D. F..G.....rR.|
00000010 92 79 30 d4 e0 45 4a 8a eb 20 fc 01 e3 36 6d 9f |.y0..EJ.. ...6m.|
00000020 89 1f 5a b3 02 20 57 0a 9b 0f b2 34 7f 3c 1e 7e |..Z.. W....4.<.~|
00000030 5f b9 77 98 24 8c fc d9 af d2 2e f1 69 55 2a 04 |_.w.$.......iU*.|
00000040 63 ed dd 29 a4 0c |c..)..|
[563a 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[563b 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d2e070 gate 1582330542583316900 evaluation starts
[563c 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d2e070 signed by 0 principal evaluation starts (used [false])
[563d 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d2e070 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[563e 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d2e070 principal evaluation succeeds for identity 0
[563f 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d2e070 gate 1582330542583316900 evaluation succeeds
[5640 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5641 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5642 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5643 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5644 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes
[5645 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5646 02-22 00:15:42.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5647 02-22 00:15:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5648 02-22 00:15:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5649 02-22 00:15:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[564a 02-22 00:15:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[564b 02-22 00:15:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[564c 02-22 00:15:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[564d 02-22 00:15:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[564e 02-22 00:15:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[564f 02-22 00:15:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5650 02-22 00:15:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5651 02-22 00:15:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5652 02-22 00:15:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 bc a7 91 01 fa e0 00 4f 11 84 4d 08 a4 c2 62 |........O..M...b|
00000010 0e 4e 41 11 1e fd c7 e0 3d c6 23 bf c9 c4 9f 83 |.NA.....=.#.....|
[5653 02-22 00:15:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 5b 83 1c 8c 33 73 99 b7 cd f9 |0E.!..[...3s....|
00000010 89 a8 13 2d 58 92 97 7f b8 84 8b ee 92 90 23 71 |...-X.........#q|
00000020 44 c9 18 e1 83 02 20 6d c5 2d 06 58 53 c1 44 bc |D..... m.-.XS.D.|
00000030 c3 87 b5 16 e9 37 fb 5f 09 e6 a8 ec fb be 07 04 |.....7._........|
00000040 e1 d1 d0 0a bd 05 53 |......S|
[5654 02-22 00:15:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5655 02-22 00:15:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d2ff50 gate 1582330542639896700 evaluation starts
[5656 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d2ff50 signed by 0 principal evaluation starts (used [false])
[5657 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d2ff50 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5658 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d2ff50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5659 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d2ff50 principal evaluation fails
[565a 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d2ff50 gate 1582330542639896700 evaluation fails
[565b 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[565c 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[565d 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[565e 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 bc a7 91 01 fa e0 00 4f 11 84 4d 08 a4 c2 62 |........O..M...b|
00000010 0e 4e 41 11 1e fd c7 e0 3d c6 23 bf c9 c4 9f 83 |.NA.....=.#.....|
[565f 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 5b 83 1c 8c 33 73 99 b7 cd f9 |0E.!..[...3s....|
00000010 89 a8 13 2d 58 92 97 7f b8 84 8b ee 92 90 23 71 |...-X.........#q|
00000020 44 c9 18 e1 83 02 20 6d c5 2d 06 58 53 c1 44 bc |D..... m.-.XS.D.|
00000030 c3 87 b5 16 e9 37 fb 5f 09 e6 a8 ec fb be 07 04 |.....7._........|
00000040 e1 d1 d0 0a bd 05 53 |......S|
[5660 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5661 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d44850 gate 1582330542644156200 evaluation starts
[5662 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d44850 signed by 0 principal evaluation starts (used [false])
[5663 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d44850 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5664 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d44850 principal evaluation succeeds for identity 0
[5665 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d44850 gate 1582330542644156200 evaluation succeeds
[5666 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5667 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5668 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5669 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[566a 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes
[566b 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes]}
[566c 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:68
[566d 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:68
[566e 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[566f 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5670 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5671 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[5672 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5673 02-22 00:15:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5674 02-22 00:15:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5675 02-22 00:15:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5676 02-22 00:15:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[5677 02-22 00:15:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[5678 02-22 00:15:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[5679 02-22 00:15:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[567a 02-22 00:15:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[567b 02-22 00:15:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[567c 02-22 00:15:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[567d 02-22 00:15:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[567e 02-22 00:15:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[567f 02-22 00:15:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[5680 02-22 00:15:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5681 02-22 00:15:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[5682 02-22 00:15:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5683 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[5684 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[5685 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[5686 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[5687 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[5688 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[5689 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[568a 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[568b 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[568c 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[568d 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[568e 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[568f 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5690 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5691 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5692 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5693 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5694 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d61cf0 gate 1582330543016784000 evaluation starts
[5695 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d61cf0 signed by 0 principal evaluation starts (used [false])
[5696 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d61cf0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5697 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d61cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5698 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d61cf0 principal evaluation fails
[5699 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d61cf0 gate 1582330543016784000 evaluation fails
[569a 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[569b 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[569c 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[569d 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[569e 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[569f 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[56a0 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d825f0 gate 1582330543019024200 evaluation starts
[56a1 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d825f0 signed by 0 principal evaluation starts (used [false])
[56a2 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d825f0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[56a3 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d825f0 principal evaluation succeeds for identity 0
[56a4 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d825f0 gate 1582330543019024200 evaluation succeeds
[56a5 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[56a6 02-22 00:15:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[56a7 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[56a8 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[56a9 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56aa 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56ab 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[56ac 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[56ad 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[56ae 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[56af 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[56b0 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[56b1 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[56b2 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[56b3 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[56b4 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d94050 gate 1582330543024517700 evaluation starts
[56b5 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d94050 signed by 0 principal evaluation starts (used [false])
[56b6 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d94050 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[56b7 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d94050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[56b8 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d94050 principal evaluation fails
[56b9 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d94050 gate 1582330543024517700 evaluation fails
[56ba 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[56bb 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[56bc 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[56bd 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[56be 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[56bf 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[56c0 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d94950 gate 1582330543026274200 evaluation starts
[56c1 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d94950 signed by 0 principal evaluation starts (used [false])
[56c2 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d94950 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[56c3 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d94950 principal evaluation succeeds for identity 0
[56c4 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d94950 gate 1582330543026274200 evaluation succeeds
[56c5 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[56c6 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[56c7 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[56c8 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[56c9 02-22 00:15:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[56ca 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[56cb 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56cc 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56cd 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56ce 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[56cf 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[56d0 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[56d1 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[56d2 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[56d3 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[56d4 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[56d5 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[56d6 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[56d7 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dae660 gate 1582330543032270100 evaluation starts
[56d8 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dae660 signed by 0 principal evaluation starts (used [false])
[56d9 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dae660 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[56da 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dae660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[56db 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dae660 principal evaluation fails
[56dc 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dae660 gate 1582330543032270100 evaluation fails
[56dd 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[56de 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[56df 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[56e0 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[56e1 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[56e2 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[56e3 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004daef60 gate 1582330543034403000 evaluation starts
[56e4 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004daef60 signed by 0 principal evaluation starts (used [false])
[56e5 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004daef60 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[56e6 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004daef60 principal evaluation succeeds for identity 0
[56e7 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004daef60 gate 1582330543034403000 evaluation succeeds
[56e8 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[56e9 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[56ea 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[56eb 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[56ec 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[56ed 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[56ee 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56ef 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[56f0 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[56f1 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[56f2 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[56f3 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[56f4 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[56f5 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[56f6 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[56f7 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[56f8 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[56f9 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc1070 gate 1582330543038481800 evaluation starts
[56fa 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc1070 signed by 0 principal evaluation starts (used [false])
[56fb 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc1070 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[56fc 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc1070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[56fd 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc1070 principal evaluation fails
[56fe 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc1070 gate 1582330543038481800 evaluation fails
[56ff 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5700 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5701 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5702 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5703 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5704 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5705 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc1970 gate 1582330543039629100 evaluation starts
[5706 02-22 00:15:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc1970 signed by 0 principal evaluation starts (used [false])
[5707 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc1970 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5708 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc1970 principal evaluation succeeds for identity 0
[5709 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc1970 gate 1582330543039629100 evaluation succeeds
[570a 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[570b 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[570c 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[570d 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[570e 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[570f 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[5710 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5711 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[5712 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5713 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5714 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5715 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5716 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5717 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5718 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5719 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[571a 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[571b 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[571c 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[571d 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[571e 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de9d30 gate 1582330543043566900 evaluation starts
[571f 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de9d30 signed by 0 principal evaluation starts (used [false])
[5720 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de9d30 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5721 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de9d30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5722 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de9d30 principal evaluation fails
[5723 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de9d30 gate 1582330543043566900 evaluation fails
[5724 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5725 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info
[5726 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5727 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5728 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5729 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[572a 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[572b 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e00630 gate 1582330543045987400 evaluation starts
[572c 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e00630 signed by 0 principal evaluation starts (used [false])
[572d 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e00630 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[572e 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e00630 principal evaluation succeeds for identity 0
[572f 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e00630 gate 1582330543045987400 evaluation succeeds
[5730 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5731 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5732 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5733 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5734 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[5735 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[5736 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[5737 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[5738 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5739 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[573a 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[573b 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[573c 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[573d 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[573e 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[573f 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5740 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5741 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5742 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5743 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1edf0 gate 1582330543051913500 evaluation starts
[5744 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1edf0 signed by 0 principal evaluation starts (used [false])
[5745 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1edf0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5747 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1edf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5748 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1edf0 principal evaluation fails
[5746 02-22 00:15:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]
[574a 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile
[5749 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1edf0 gate 1582330543051913500 evaluation fails
[574b 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[574c 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[574d 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[574e 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[574f 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5750 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5751 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1f6f0 gate 1582330543054985200 evaluation starts
[5752 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1f6f0 signed by 0 principal evaluation starts (used [false])
[5753 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1f6f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5754 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1f6f0 principal evaluation succeeds for identity 0
[5755 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1f6f0 gate 1582330543054985200 evaluation succeeds
[5756 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5757 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5758 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5759 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[575a 02-22 00:15:43.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[575b 02-22 00:15:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[575c 02-22 00:15:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[575d 02-22 00:15:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[575e 02-22 00:15:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[575f 02-22 00:15:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5760 02-22 00:15:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:757135487462231970 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[5761 02-22 00:15:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:757135487462231970 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[5762 02-22 00:15:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5763 02-22 00:15:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 757135487462231970 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[5764 02-22 00:15:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 757135487462231970 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[5765 02-22 00:15:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5766 02-22 00:15:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[5767 02-22 00:15:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5768 02-22 00:15:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5769 02-22 00:15:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[576a 02-22 00:15:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14346073581794152043 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[576b 02-22 00:15:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14346073581794152043 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[576c 02-22 00:15:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[576d 02-22 00:15:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[576e 02-22 00:15:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[576f 02-22 00:15:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5770 02-22 00:15:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5771 02-22 00:15:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5772 02-22 00:15:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5773 02-22 00:15:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[5774 02-22 00:15:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[5775 02-22 00:15:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5776 02-22 00:15:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5777 02-22 00:15:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5778 02-22 00:15:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5779 02-22 00:15:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[577a 02-22 00:15:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[577b 02-22 00:15:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[577c 02-22 00:15:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[577d 02-22 00:15:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 26 99 b3 f0 9d bb e7 17 6a 93 9c d5 e8 85 ff |'&.......j......|
00000010 00 95 99 10 29 12 2a 80 fd d7 5c 62 ae fd 3e f7 |....).*...\b..>.|
[577e 02-22 00:15:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 0f 48 23 51 db 39 65 55 af a0 |0E.!...H#Q.9eU..|
00000010 23 ba 00 90 a8 15 1f be 99 01 28 ba 05 c0 be 5f |#.........(...._|
00000020 23 25 00 86 04 02 20 1b d8 44 62 79 d0 87 cc 76 |#%.... ..Dby...v|
00000030 30 73 f6 8d 63 2e 8c f4 e3 39 15 4d 66 54 f9 26 |0s..c....9.MfT.&|
00000040 2e af df 28 b2 5b 80 |...(.[.|
[577f 02-22 00:15:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[5780 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 2a c3 19 fe 84 8c e7 ab 03 36 45 |0D. .*........6E|
00000010 69 33 f8 e9 2a 80 e3 72 4a 09 72 19 1a 2d 58 03 |i3..*..rJ.r..-X.|
00000020 98 ea 66 82 02 20 71 2b 31 5f bb e9 d7 25 9f e1 |..f.. q+1_...%..|
00000030 c5 32 94 82 51 e4 5c 9e ad 86 9b 25 16 d0 e6 bc |.2..Q.\....%....|
00000040 fc 60 4b bb 48 91 |.`K.H.|
[5781 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5782 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[5783 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:72
[5784 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:72
[5785 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[5786 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5787 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5788 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5789 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[578a 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[578b 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[578c 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[578d 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[578f 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5790 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes
[5791 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[578e 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes
[5792 02-22 00:15:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5793 02-22 00:15:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes
[5794 02-22 00:15:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5795 02-22 00:15:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes
[5796 02-22 00:15:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5797 02-22 00:15:44.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes
[5798 02-22 00:15:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes
[5799 02-22 00:15:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[579a 02-22 00:15:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes
[579b 02-22 00:15:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[579c 02-22 00:15:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[579d 02-22 00:15:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[579e 02-22 00:15:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[579f 02-22 00:15:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[57a0 02-22 00:15:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[57a1 02-22 00:15:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57a2 02-22 00:15:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[57a3 02-22 00:15:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[57a4 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[57a5 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[57a6 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[57a7 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[57a8 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ca 1f ca 81 df df f4 33 b7 bd ea 13 f8 06 88 0a |.......3........|
00000010 79 df 85 b3 02 74 ac d6 e6 2d be 5a 6b 81 98 f2 |y....t...-.Zk...|
[57a9 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 9b 26 9d 3f 6b 88 f1 28 27 cb |0E.!...&.?k..('.|
00000010 9e ad 65 03 2c 69 f2 27 ce e4 2f ce 72 72 5c 41 |..e.,i.'../.rr\A|
00000020 31 46 b5 43 b8 02 20 06 63 7d 16 09 c0 c8 63 80 |1F.C.. .c}....c.|
00000030 a6 60 ad 14 3f 3d 85 33 a4 a7 bf 2c 25 52 0a d2 |.`..?=.3...,%R..|
00000040 32 bc 3e 4f 25 6b 28 |2.>O%k(|
[57aa 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[57ab 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8f1c0 gate 1582330544301525600 evaluation starts
[57ac 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8f1c0 signed by 0 principal evaluation starts (used [false])
[57ad 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8f1c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[57ae 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8f1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[57af 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8f1c0 principal evaluation fails
[57b0 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8f1c0 gate 1582330544301525600 evaluation fails
[57b1 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[57b2 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[57b3 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[57b4 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ca 1f ca 81 df df f4 33 b7 bd ea 13 f8 06 88 0a |.......3........|
00000010 79 df 85 b3 02 74 ac d6 e6 2d be 5a 6b 81 98 f2 |y....t...-.Zk...|
[57b5 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 9b 26 9d 3f 6b 88 f1 28 27 cb |0E.!...&.?k..('.|
00000010 9e ad 65 03 2c 69 f2 27 ce e4 2f ce 72 72 5c 41 |..e.,i.'../.rr\A|
00000020 31 46 b5 43 b8 02 20 06 63 7d 16 09 c0 c8 63 80 |1F.C.. .c}....c.|
00000030 a6 60 ad 14 3f 3d 85 33 a4 a7 bf 2c 25 52 0a d2 |.`..?=.3...,%R..|
00000040 32 bc 3e 4f 25 6b 28 |2.>O%k(|
[57b6 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[57b7 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8fac0 gate 1582330544301958500 evaluation starts
[57b8 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8fac0 signed by 0 principal evaluation starts (used [false])
[57b9 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8fac0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[57ba 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8fac0 principal evaluation succeeds for identity 0
[57bb 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8fac0 gate 1582330544301958500 evaluation succeeds
[57bc 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[57bd 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[57be 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[57bf 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[57c0 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[57c1 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes]}
[57c2 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:71
[57c3 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:71
[57c4 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[57c5 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57c6 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57c7 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57c8 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57c9 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57ca 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57cb 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57cc 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57cd 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57ce 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[57cf 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57d0 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57d1 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[57d2 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[57d3 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57d4 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[57d5 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57d6 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[57d7 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57d8 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[57d9 02-22 00:15:44.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57da 02-22 00:15:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[57db 02-22 00:15:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57dc 02-22 00:15:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[57dd 02-22 00:15:44.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57de 02-22 00:15:44.33 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[57df 02-22 00:15:44.33 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[57e0 02-22 00:15:44.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510191801
[57e1 02-22 00:15:44.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2633A2CE2CF5172E196C289037D0ADB0750833D846795B85C4C4229D6C605E01
[57e2 02-22 00:15:44.33 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[57e3 02-22 00:15:44.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57e4 02-22 00:15:44.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57e5 02-22 00:15:44.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57e6 02-22 00:15:44.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57e7 02-22 00:15:44.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:25 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[57e8 02-22 00:15:44.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57ea 02-22 00:15:44.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57e9 02-22 00:15:44.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:25 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[57eb 02-22 00:15:44.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57ec 02-22 00:15:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[57ed 02-22 00:15:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[57ee 02-22 00:15:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[57ef 02-22 00:15:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[57f0 02-22 00:15:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[57f1 02-22 00:15:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[57f2 02-22 00:15:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[57f3 02-22 00:15:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[57f4 02-22 00:15:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[57f5 02-22 00:15:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[57f6 02-22 00:15:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[57f7 02-22 00:15:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 bc 36 4e ee 3d 70 20 14 d1 c8 54 0a f2 91 1f |..6N.=p ...T....|
00000010 47 13 72 e6 ec fe 11 1c 22 f2 e0 ec 0e 6b 7e ce |G.r....."....k~.|
[57f8 02-22 00:15:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 22 2b 05 3c 2d e6 d2 d6 55 a5 |0E.!.."+.<-...U.|
00000010 65 a3 7d e1 d3 02 03 65 68 fd d7 73 34 f8 bf 87 |e.}....eh..s4...|
00000020 9f 24 1c dc d6 02 20 76 a3 75 9e ae 6c 47 77 bf |.$.... v.u..lGw.|
00000030 42 ad 42 12 39 e4 73 f4 ab e7 66 30 89 38 1f 7f |B.B.9.s...f0.8..|
00000040 18 e0 51 0b 6e f0 4d |..Q.n.M|
[57f9 02-22 00:15:44.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[57fa 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed2eb0 gate 1582330544370398800 evaluation starts
[57fb 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed2eb0 signed by 0 principal evaluation starts (used [false])
[57fc 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed2eb0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[57fd 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed2eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[57fe 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed2eb0 principal evaluation fails
[57ff 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed2eb0 gate 1582330544370398800 evaluation fails
[5800 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5801 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5802 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5803 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 bc 36 4e ee 3d 70 20 14 d1 c8 54 0a f2 91 1f |..6N.=p ...T....|
00000010 47 13 72 e6 ec fe 11 1c 22 f2 e0 ec 0e 6b 7e ce |G.r....."....k~.|
[5804 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 22 2b 05 3c 2d e6 d2 d6 55 a5 |0E.!.."+.<-...U.|
00000010 65 a3 7d e1 d3 02 03 65 68 fd d7 73 34 f8 bf 87 |e.}....eh..s4...|
00000020 9f 24 1c dc d6 02 20 76 a3 75 9e ae 6c 47 77 bf |.$.... v.u..lGw.|
00000030 42 ad 42 12 39 e4 73 f4 ab e7 66 30 89 38 1f 7f |B.B.9.s...f0.8..|
00000040 18 e0 51 0b 6e f0 4d |..Q.n.M|
[5805 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5806 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec4b50 gate 1582330544375232900 evaluation starts
[5807 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec4b50 signed by 0 principal evaluation starts (used [false])
[5808 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec4b50 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5809 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec4b50 principal evaluation succeeds for identity 0
[580a 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec4b50 gate 1582330544375232900 evaluation succeeds
[580b 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[580c 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[580d 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[580e 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[580f 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5810 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes]}
[5811 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:69
[5812 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:69
[5813 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:68 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[5814 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5815 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5816 02-22 00:15:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5817 02-22 00:15:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5818 02-22 00:15:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5819 02-22 00:15:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[581a 02-22 00:15:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[581b 02-22 00:15:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[581c 02-22 00:15:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[581d 02-22 00:15:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[581e 02-22 00:15:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[581f 02-22 00:15:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5821 02-22 00:15:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5822 02-22 00:15:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5823 02-22 00:15:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5820 02-22 00:15:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5824 02-22 00:15:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5825 02-22 00:15:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5826 02-22 00:15:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5827 02-22 00:15:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5828 02-22 00:15:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[5829 02-22 00:15:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[582a 02-22 00:15:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[582b 02-22 00:15:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[582c 02-22 00:15:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[582d 02-22 00:15:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[582e 02-22 00:15:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151044
[582f 02-22 00:15:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F702B2C1CA181A0C3D58E8604F274C204C808DFDB957C9ABC392ACE4497221DB
[5830 02-22 00:15:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[5831 02-22 00:15:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[5832 02-22 00:15:44.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[5833 02-22 00:15:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5834 02-22 00:15:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5835 02-22 00:15:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5836 02-22 00:15:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5837 02-22 00:15:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[5838 02-22 00:15:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[583a 02-22 00:15:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[583b 02-22 00:15:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[583c 02-22 00:15:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5839 02-22 00:15:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes
[583d 02-22 00:15:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[583e 02-22 00:15:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes
[583f 02-22 00:15:44.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5840 02-22 00:15:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:18378781564801824175 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5841 02-22 00:15:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:18378781564801824175 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5842 02-22 00:15:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5843 02-22 00:15:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5844 02-22 00:15:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5845 02-22 00:15:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5846 02-22 00:15:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5847 02-22 00:15:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5848 02-22 00:15:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[5849 02-22 00:15:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[584a 02-22 00:15:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[584b 02-22 00:15:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[584c 02-22 00:15:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[584d 02-22 00:15:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[584e 02-22 00:15:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 19 c3 2d f3 b3 26 4c b5 93 9a fd ab f1 92 21 |...-..&L.......!|
00000010 1e 01 a5 1f 10 fb 7f 5c 32 af 21 2c 11 99 5c f9 |.......\2.!,..\.|
[584f 02-22 00:15:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd dc 01 c5 25 ed 3d 0e e7 14 3c |0E.!.....%.=...<|
00000010 99 59 1e de 30 50 11 0a 01 64 86 48 29 59 44 85 |.Y..0P...d.H)YD.|
00000020 8e b9 de 46 37 02 20 15 bc f8 53 bb b3 76 64 e5 |...F7. ...S..vd.|
00000030 41 2e 15 e2 4b e5 39 d6 1c 95 18 ba 13 63 e6 ba |A...K.9......c..|
00000040 72 83 d8 fb e2 20 ff |r.... .|
[5850 02-22 00:15:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[5851 02-22 00:15:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 2d d3 05 f7 c5 7d fc a6 c2 79 |0E.!..-....}...y|
00000010 03 39 33 b1 02 42 af a6 46 40 be 90 6e d0 cf d9 |.93..B..F@..n...|
00000020 fa d1 1c f7 e1 02 20 29 ab 1a b1 20 4e a4 c1 a6 |...... )... N...|
00000030 29 fd af 6e be 91 7c 84 d8 33 64 b3 07 db 82 75 |)..n..|..3d....u|
00000040 0c 28 ec a7 92 a6 5a |.(....Z|
[5852 02-22 00:15:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5853 02-22 00:15:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[5854 02-22 00:15:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:73
[5855 02-22 00:15:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:73
[5856 02-22 00:15:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[5857 02-22 00:15:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5858 02-22 00:15:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5859 02-22 00:15:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[585a 02-22 00:15:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[585b 02-22 00:15:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[585c 02-22 00:15:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[585d 02-22 00:15:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[585e 02-22 00:15:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[585f 02-22 00:15:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[5860 02-22 00:15:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5861 02-22 00:15:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:8728882620364050512 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5862 02-22 00:15:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:8728882620364050512 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5863 02-22 00:15:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:8728882620364050512 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5864 02-22 00:15:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5865 02-22 00:15:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5866 02-22 00:15:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5867 02-22 00:15:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5868 02-22 00:15:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5869 02-22 00:15:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[586a 02-22 00:15:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[586b 02-22 00:15:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[586c 02-22 00:15:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:17786040278924189342 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[586d 02-22 00:15:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:17786040278924189342 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[586e 02-22 00:15:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[586f 02-22 00:15:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5870 02-22 00:15:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[5871 02-22 00:15:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:532947146663605721 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[5872 02-22 00:15:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[5873 02-22 00:15:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:8305440928537389789 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[5874 02-22 00:15:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:532947146663605721 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5875 02-22 00:15:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5876 02-22 00:15:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[5877 02-22 00:15:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:16289407143804063615 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[5878 02-22 00:15:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:8305440928537389789 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5879 02-22 00:15:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[587a 02-22 00:15:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 532947146663605721 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[587b 02-22 00:15:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:16289407143804063615 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[587d 02-22 00:15:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[587c 02-22 00:15:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 532947146663605721 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[587e 02-22 00:15:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[587f 02-22 00:15:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16289407143804063615 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[5880 02-22 00:15:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16289407143804063615 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[5881 02-22 00:15:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5882 02-22 00:15:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8305440928537389789 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[5883 02-22 00:15:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8305440928537389789 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[5884 02-22 00:15:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8305440928537389789 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[5885 02-22 00:15:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5886 02-22 00:15:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5887 02-22 00:15:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5888 02-22 00:15:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5889 02-22 00:15:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[588a 02-22 00:15:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[588b 02-22 00:15:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[588c 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[588d 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[588e 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[588f 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5890 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5891 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5892 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b 96 95 d8 cd bf ad b5 56 63 f0 8f 22 6b e2 b8 |[.......Vc.."k..|
00000010 80 d3 f2 5c b9 63 ff 72 7d eb c7 af 53 37 64 4e |...\.c.r}...S7dN|
[5893 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 3b 1e 9e ce de 8f 98 60 9c 57 |0E.!..;......`.W|
00000010 1c a5 1e 3f ac fa 55 be 4e 1b ae 1e dd e6 04 87 |...?..U.N.......|
00000020 bf b3 06 79 8e 02 20 75 47 3e 4d 3c 66 12 f8 d5 |...y.. uG>M<f...|
00000030 37 87 4c 96 c9 8e 3a 5e 83 d8 d5 54 d3 3e 43 28 |7.L...:^...T.>C(|
00000040 ee 0e f0 b1 d2 d0 b1 |.......|
[5894 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5895 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4de20 gate 1582330546472475300 evaluation starts
[5896 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4de20 signed by 0 principal evaluation starts (used [false])
[5897 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4de20 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5898 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4de20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5899 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4de20 principal evaluation fails
[589a 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4de20 gate 1582330546472475300 evaluation fails
[589b 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[589c 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[589d 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[589e 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b 96 95 d8 cd bf ad b5 56 63 f0 8f 22 6b e2 b8 |[.......Vc.."k..|
00000010 80 d3 f2 5c b9 63 ff 72 7d eb c7 af 53 37 64 4e |...\.c.r}...S7dN|
[589f 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 3b 1e 9e ce de 8f 98 60 9c 57 |0E.!..;......`.W|
00000010 1c a5 1e 3f ac fa 55 be 4e 1b ae 1e dd e6 04 87 |...?..U.N.......|
00000020 bf b3 06 79 8e 02 20 75 47 3e 4d 3c 66 12 f8 d5 |...y.. uG>M<f...|
00000030 37 87 4c 96 c9 8e 3a 5e 83 d8 d5 54 d3 3e 43 28 |7.L...:^...T.>C(|
00000040 ee 0e f0 b1 d2 d0 b1 |.......|
[58a0 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[58a1 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7c720 gate 1582330546474352500 evaluation starts
[58a2 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7c720 signed by 0 principal evaluation starts (used [false])
[58a3 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7c720 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[58a4 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7c720 principal evaluation succeeds for identity 0
[58a5 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f7c720 gate 1582330546474352500 evaluation succeeds
[58a6 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[58a7 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[58a8 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[58a9 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[58aa 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes
[58ab 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes]}
[58ac 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:72
[58ad 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:72
[58ae 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[58af 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58b0 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58b1 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58b2 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[58b3 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[58b4 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[58b5 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[58b6 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[58b7 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[58b8 02-22 00:15:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[58b9 02-22 00:15:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58ba 02-22 00:15:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151045
[58bb 02-22 00:15:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7F2EA7FE894C7F22B7D7D59DEEBC9DB333A7F1BC30B6C082CC050B98AB747E78
[58bc 02-22 00:15:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[58bd 02-22 00:15:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[58be 02-22 00:15:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[58bf 02-22 00:15:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[58c0 02-22 00:15:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[58c1 02-22 00:15:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[58c2 02-22 00:15:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[58c3 02-22 00:15:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58c4 02-22 00:15:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[58c5 02-22 00:15:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[58c6 02-22 00:15:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58c7 02-22 00:15:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[58c8 02-22 00:15:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58c9 02-22 00:15:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[58ca 02-22 00:15:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58cb 02-22 00:15:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[58cc 02-22 00:15:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[58cd 02-22 00:15:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 2e a7 fe 89 4c 7f 22 b7 d7 d5 9d ee bc 9d b3 |.....L."........|
00000010 33 a7 f1 bc 30 b6 c0 82 cc 05 0b 98 ab 74 7e 78 |3...0........t~x|
[58ce 02-22 00:15:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 24 54 35 2a 4f ff a0 93 2f 11 |0E.!..$T5*O.../.|
00000010 e8 82 69 28 6f d4 f9 fb c2 a7 8c f2 ea 43 5e da |..i(o........C^.|
00000020 a9 64 c2 b4 12 02 20 6a 81 e6 fc 28 1b ab eb e9 |.d.... j...(....|
00000030 e0 94 71 e3 fc f2 c7 28 84 6d cb 4d 0a 29 b4 7f |..q....(.m.M.)..|
00000040 5d 66 f4 76 af 1b f7 |]f.v...|
[58cf 02-22 00:15:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[58d0 02-22 00:15:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[58d1 02-22 00:15:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[58d2 02-22 00:15:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 05 29 b4 c2 df 60 00 ae 7c 2e |0E.!...)...`..|.|
00000010 e2 df a2 47 89 e5 f4 a5 d6 04 95 1e d4 2e 19 f8 |...G............|
00000020 30 b2 00 45 73 02 20 46 7e f4 8b 7a a8 a6 f9 dc |0..Es. F~..z....|
00000030 f9 17 7f e6 95 e4 34 5d e1 81 0c 31 d1 81 45 8e |......4]...1..E.|
00000040 d4 21 4c 01 46 8e 63 |.!L.F.c|
[58d3 02-22 00:15:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[58d4 02-22 00:15:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[58d5 02-22 00:15:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58d6 02-22 00:15:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58d7 02-22 00:15:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58d9 02-22 00:15:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[58d8 02-22 00:15:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[58da 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[58db 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 2e a7 fe 89 4c 7f 22 b7 d7 d5 9d ee bc 9d b3 |.....L."........|
00000010 33 a7 f1 bc 30 b6 c0 82 cc 05 0b 98 ab 74 7e 78 |3...0........t~x|
[58dc 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 24 54 35 2a 4f ff a0 93 2f 11 |0E.!..$T5*O.../.|
00000010 e8 82 69 28 6f d4 f9 fb c2 a7 8c f2 ea 43 5e da |..i(o........C^.|
00000020 a9 64 c2 b4 12 02 20 6a 81 e6 fc 28 1b ab eb e9 |.d.... j...(....|
00000030 e0 94 71 e3 fc f2 c7 28 84 6d cb 4d 0a 29 b4 7f |..q....(.m.M.)..|
00000040 5d 66 f4 76 af 1b f7 |]f.v...|
[58dd 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[58de 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[58df 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58e0 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[58e1 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 19 c3 2d f3 b3 26 4c b5 93 9a fd ab f1 92 21 |...-..&L.......!|
00000010 1e 01 a5 1f 10 fb 7f 5c 32 af 21 2c 11 99 5c f9 |.......\2.!,..\.|
[58e2 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd dc 01 c5 25 ed 3d 0e e7 14 3c |0E.!.....%.=...<|
00000010 99 59 1e de 30 50 11 0a 01 64 86 48 29 59 44 85 |.Y..0P...d.H)YD.|
00000020 8e b9 de 46 37 02 20 15 bc f8 53 bb b3 76 64 e5 |...F7. ...S..vd.|
00000030 41 2e 15 e2 4b e5 39 d6 1c 95 18 ba 13 63 e6 ba |A...K.9......c..|
00000040 72 83 d8 fb e2 20 ff |r.... .|
[58e3 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[58e4 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[58e5 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[58e6 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[58e7 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[58e8 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[58e9 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[58ea 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[58eb 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[58ec 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[58ed 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b 96 95 d8 cd bf ad b5 56 63 f0 8f 22 6b e2 b8 |[.......Vc.."k..|
00000010 80 d3 f2 5c b9 63 ff 72 7d eb c7 af 53 37 64 4e |...\.c.r}...S7dN|
[58ee 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 3b 1e 9e ce de 8f 98 60 9c 57 |0E.!..;......`.W|
00000010 1c a5 1e 3f ac fa 55 be 4e 1b ae 1e dd e6 04 87 |...?..U.N.......|
00000020 bf b3 06 79 8e 02 20 75 47 3e 4d 3c 66 12 f8 d5 |...y.. uG>M<f...|
00000030 37 87 4c 96 c9 8e 3a 5e 83 d8 d5 54 d3 3e 43 28 |7.L...:^...T.>C(|
00000040 ee 0e f0 b1 d2 d0 b1 |.......|
[58ef 02-22 00:15:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[58f0 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd4540 gate 1582330546590069300 evaluation starts
[58f1 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd4540 signed by 0 principal evaluation starts (used [false])
[58f2 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd4540 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[58f3 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd4540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[58f4 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd4540 principal evaluation fails
[58f5 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd4540 gate 1582330546590069300 evaluation fails
[58f6 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[58f7 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[58f8 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[58f9 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b 96 95 d8 cd bf ad b5 56 63 f0 8f 22 6b e2 b8 |[.......Vc.."k..|
00000010 80 d3 f2 5c b9 63 ff 72 7d eb c7 af 53 37 64 4e |...\.c.r}...S7dN|
[58fa 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 3b 1e 9e ce de 8f 98 60 9c 57 |0E.!..;......`.W|
00000010 1c a5 1e 3f ac fa 55 be 4e 1b ae 1e dd e6 04 87 |...?..U.N.......|
00000020 bf b3 06 79 8e 02 20 75 47 3e 4d 3c 66 12 f8 d5 |...y.. uG>M<f...|
00000030 37 87 4c 96 c9 8e 3a 5e 83 d8 d5 54 d3 3e 43 28 |7.L...:^...T.>C(|
00000040 ee 0e f0 b1 d2 d0 b1 |.......|
[58fb 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[58fc 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd4e40 gate 1582330546592740100 evaluation starts
[58fd 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd4e40 signed by 0 principal evaluation starts (used [false])
[58fe 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd4e40 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[58ff 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd4e40 principal evaluation succeeds for identity 0
[5900 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd4e40 gate 1582330546592740100 evaluation succeeds
[5901 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5902 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5903 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5904 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5905 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes
[5906 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5907 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5908 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5909 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[590a 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[590b 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 2e a7 fe 89 4c 7f 22 b7 d7 d5 9d ee bc 9d b3 |.....L."........|
00000010 33 a7 f1 bc 30 b6 c0 82 cc 05 0b 98 ab 74 7e 78 |3...0........t~x|
[590c 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 24 54 35 2a 4f ff a0 93 2f 11 |0E.!..$T5*O.../.|
00000010 e8 82 69 28 6f d4 f9 fb c2 a7 8c f2 ea 43 5e da |..i(o........C^.|
00000020 a9 64 c2 b4 12 02 20 6a 81 e6 fc 28 1b ab eb e9 |.d.... j...(....|
00000030 e0 94 71 e3 fc f2 c7 28 84 6d cb 4d 0a 29 b4 7f |..q....(.m.M.)..|
00000040 5d 66 f4 76 af 1b f7 |]f.v...|
[590d 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[590e 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes
[590f 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5910 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[5911 02-22 00:15:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 19 c3 2d f3 b3 26 4c b5 93 9a fd ab f1 92 21 |...-..&L.......!|
00000010 1e 01 a5 1f 10 fb 7f 5c 32 af 21 2c 11 99 5c f9 |.......\2.!,..\.|
[5912 02-22 00:15:46.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd dc 01 c5 25 ed 3d 0e e7 14 3c |0E.!.....%.=...<|
00000010 99 59 1e de 30 50 11 0a 01 64 86 48 29 59 44 85 |.Y..0P...d.H)YD.|
00000020 8e b9 de 46 37 02 20 15 bc f8 53 bb b3 76 64 e5 |...F7. ...S..vd.|
00000030 41 2e 15 e2 4b e5 39 d6 1c 95 18 ba 13 63 e6 ba |A...K.9......c..|
00000040 72 83 d8 fb e2 20 ff |r.... .|
[5913 02-22 00:15:46.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5914 02-22 00:15:46.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5915 02-22 00:15:46.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5916 02-22 00:15:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5917 02-22 00:15:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5918 02-22 00:15:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5919 02-22 00:15:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[591a 02-22 00:15:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[591b 02-22 00:15:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[591c 02-22 00:15:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[591d 02-22 00:15:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[591e 02-22 00:15:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[591f 02-22 00:15:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5920 02-22 00:15:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5921 02-22 00:15:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f 64 28 30 4a 2a 72 9c 0f 6b da 03 41 6f cf f4 |.d(0J*r..k..Ao..|
00000010 4c d5 4c c7 16 28 60 61 ef 74 06 86 ac 0e 72 20 |L.L..(`a.t....r |
[5922 02-22 00:15:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 49 eb eb 56 c5 91 97 8e 62 02 |0E.!..I..V....b.|
00000010 ab 1f 41 4f bf 47 34 89 52 56 2b d6 2d f6 0c cc |..AO.G4.RV+.-...|
00000020 c0 58 68 f3 56 02 20 6f 2a 8a fb 99 41 b0 07 0b |.Xh.V. o*...A...|
00000030 0b e8 a2 84 86 73 bb d3 fc 86 a9 b5 da 27 34 8f |.....s.......'4.|
00000040 39 1d 4d 86 f2 9f 97 |9.M....|
[5923 02-22 00:15:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5924 02-22 00:15:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffc320 gate 1582330546639877200 evaluation starts
[5925 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffc320 signed by 0 principal evaluation starts (used [false])
[5926 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffc320 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5927 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffc320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5928 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffc320 principal evaluation fails
[5929 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffc320 gate 1582330546639877200 evaluation fails
[592a 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[592b 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[592c 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[592d 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f 64 28 30 4a 2a 72 9c 0f 6b da 03 41 6f cf f4 |.d(0J*r..k..Ao..|
00000010 4c d5 4c c7 16 28 60 61 ef 74 06 86 ac 0e 72 20 |L.L..(`a.t....r |
[592e 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 49 eb eb 56 c5 91 97 8e 62 02 |0E.!..I..V....b.|
00000010 ab 1f 41 4f bf 47 34 89 52 56 2b d6 2d f6 0c cc |..AO.G4.RV+.-...|
00000020 c0 58 68 f3 56 02 20 6f 2a 8a fb 99 41 b0 07 0b |.Xh.V. o*...A...|
00000030 0b e8 a2 84 86 73 bb d3 fc 86 a9 b5 da 27 34 8f |.....s.......'4.|
00000040 39 1d 4d 86 f2 9f 97 |9.M....|
[592f 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5930 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffcc20 gate 1582330546642601900 evaluation starts
[5931 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffcc20 signed by 0 principal evaluation starts (used [false])
[5932 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffcc20 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5933 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffcc20 principal evaluation succeeds for identity 0
[5934 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffcc20 gate 1582330546642601900 evaluation succeeds
[5935 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5936 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5937 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5938 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5939 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes
[593a 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes]}
[593b 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:70
[593c 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:70
[593d 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:69 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[593e 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[593f 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5940 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5941 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[5942 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5943 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5944 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5945 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[5946 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[5947 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[5948 02-22 00:15:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5949 02-22 00:15:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[594a 02-22 00:15:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[594b 02-22 00:15:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[594c 02-22 00:15:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[594f 02-22 00:15:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[594d 02-22 00:15:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[5950 02-22 00:15:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[594e 02-22 00:15:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[5951 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5952 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[5953 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[5954 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5955 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5956 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5957 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5958 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5959 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[595a 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[595b 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[595c 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[595d 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[595e 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[595f 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5960 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050286b0 gate 1582330547015375500 evaluation starts
[5961 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050286b0 signed by 0 principal evaluation starts (used [false])
[5962 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050286b0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5963 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050286b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5964 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050286b0 principal evaluation fails
[5965 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050286b0 gate 1582330547015375500 evaluation fails
[5966 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5967 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5968 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5969 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[596a 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[596b 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[596c 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005028fb0 gate 1582330547018667300 evaluation starts
[596d 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005028fb0 signed by 0 principal evaluation starts (used [false])
[596e 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005028fb0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[596f 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005028fb0 principal evaluation succeeds for identity 0
[5970 02-22 00:15:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005028fb0 gate 1582330547018667300 evaluation succeeds
[5971 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5972 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5973 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5974 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5975 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[5976 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[5977 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5978 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5979 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[597a 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[597b 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[597c 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[597d 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[597e 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[597f 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5980 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5981 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5982 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b0c0 gate 1582330547024727600 evaluation starts
[5983 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b0c0 signed by 0 principal evaluation starts (used [false])
[5984 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b0c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5985 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b0c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5986 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b0c0 principal evaluation fails
[5987 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b0c0 gate 1582330547024727600 evaluation fails
[5988 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5989 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[598a 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[598b 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[598c 02-22 00:15:47.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[598d 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[598e 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b9c0 gate 1582330547030424600 evaluation starts
[598f 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b9c0 signed by 0 principal evaluation starts (used [false])
[5990 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b9c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5991 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b9c0 principal evaluation succeeds for identity 0
[5992 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b9c0 gate 1582330547030424600 evaluation succeeds
[5993 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5994 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5995 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5996 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5997 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[5998 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[5999 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[599a 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[599b 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[599c 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[599d 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[599e 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[599f 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[59a0 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[59a1 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[59a2 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[59a3 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[59a4 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[59a5 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[59a6 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[59a7 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005053d80 gate 1582330547036265500 evaluation starts
[59a8 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005053d80 signed by 0 principal evaluation starts (used [false])
[59a9 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005053d80 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[59aa 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005053d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[59ab 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005053d80 principal evaluation fails
[59ac 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005053d80 gate 1582330547036265500 evaluation fails
[59ad 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[59ae 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[59af 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[59b0 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[59b1 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[59b2 02-22 00:15:47.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[59b3 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506c680 gate 1582330547040087800 evaluation starts
[59b4 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506c680 signed by 0 principal evaluation starts (used [false])
[59b5 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506c680 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[59b6 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506c680 principal evaluation succeeds for identity 0
[59b7 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506c680 gate 1582330547040087800 evaluation succeeds
[59b8 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[59b9 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[59ba 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[59bb 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[59bc 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[59bd 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[59be 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[59bf 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[59c0 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[59c1 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[59c2 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[59c3 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[59c4 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[59c5 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[59c6 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[59c7 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[59c8 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[59c9 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[59ca 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[59cb 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005084e40 gate 1582330547045856800 evaluation starts
[59cc 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005084e40 signed by 0 principal evaluation starts (used [false])
[59cd 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005084e40 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[59ce 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005084e40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[59cf 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005084e40 principal evaluation fails
[59d0 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005084e40 gate 1582330547045856800 evaluation fails
[59d1 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[59d2 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[59d3 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[59d4 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[59d5 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[59d6 02-22 00:15:47.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[59d7 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005085740 gate 1582330547050148800 evaluation starts
[59d8 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005085740 signed by 0 principal evaluation starts (used [false])
[59d9 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005085740 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[59da 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005085740 principal evaluation succeeds for identity 0
[59db 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005085740 gate 1582330547050148800 evaluation succeeds
[59dc 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[59dd 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[59de 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[59df 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[59e0 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[59e1 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[59e2 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[59e3 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[59e4 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[59e5 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[59e6 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[59e7 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[59e8 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[59e9 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[59ea 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[59eb 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[59ec 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[59ed 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[59ee 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[59ef 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[59f0 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[59f1 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b80e0 gate 1582330547056741800 evaluation starts
[59f2 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b80e0 signed by 0 principal evaluation starts (used [false])
[59f3 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b80e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[59f4 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b80e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[59f5 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b80e0 principal evaluation fails
[59f6 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b80e0 gate 1582330547056741800 evaluation fails
[59f7 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[59f8 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[59f9 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[59fa 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[59fb 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[59fc 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[59fd 02-22 00:15:47.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b89e0 gate 1582330547059621400 evaluation starts
[59fe 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b89e0 signed by 0 principal evaluation starts (used [false])
[59ff 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b89e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5a00 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b89e0 principal evaluation succeeds for identity 0
[5a01 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b89e0 gate 1582330547059621400 evaluation succeeds
[5a02 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5a03 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5a04 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5a05 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5a06 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a07 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a08 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5a09 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5a0a 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5a0b 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5a0c 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5a0d 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5a0e 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5a0f 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5a10 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5a11 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050d0440 gate 1582330547068864000 evaluation starts
[5a12 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050d0440 signed by 0 principal evaluation starts (used [false])
[5a13 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050d0440 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5a14 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050d0440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5a15 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050d0440 principal evaluation fails
[5a16 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050d0440 gate 1582330547068864000 evaluation fails
[5a17 02-22 00:15:47.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5a18 02-22 00:15:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5a19 02-22 00:15:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5a1a 02-22 00:15:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5a1b 02-22 00:15:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5a1c 02-22 00:15:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5a1d 02-22 00:15:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050d0d40 gate 1582330547071201500 evaluation starts
[5a1e 02-22 00:15:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050d0d40 signed by 0 principal evaluation starts (used [false])
[5a1f 02-22 00:15:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050d0d40 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5a20 02-22 00:15:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050d0d40 principal evaluation succeeds for identity 0
[5a21 02-22 00:15:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050d0d40 gate 1582330547071201500 evaluation succeeds
[5a22 02-22 00:15:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5a23 02-22 00:15:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5a24 02-22 00:15:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5a25 02-22 00:15:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5a26 02-22 00:15:47.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a27 02-22 00:15:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a28 02-22 00:15:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a29 02-22 00:15:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[5a2a 02-22 00:15:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a2b 02-22 00:15:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a2c 02-22 00:15:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:13826636471111733759 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[5a2d 02-22 00:15:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:13826636471111733759 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[5a2e 02-22 00:15:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a2f 02-22 00:15:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 13826636471111733759 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[5a30 02-22 00:15:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 13826636471111733759 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[5a31 02-22 00:15:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a32 02-22 00:15:47.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[5a33 02-22 00:15:47.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a34 02-22 00:15:47.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a35 02-22 00:15:47.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a36 02-22 00:15:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16527330010679421239 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[5a37 02-22 00:15:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16527330010679421239 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[5a38 02-22 00:15:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[5a39 02-22 00:15:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a3a 02-22 00:15:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[5a3b 02-22 00:15:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a3c 02-22 00:15:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a3d 02-22 00:15:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a3e 02-22 00:15:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a3f 02-22 00:15:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[5a40 02-22 00:15:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[5a41 02-22 00:15:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a42 02-22 00:15:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a43 02-22 00:15:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a44 02-22 00:15:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a45 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5a46 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a47 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5a48 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[5a49 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 36 42 07 cb 42 af 0e bc f0 23 0c 68 47 44 ad |S6B..B....#.hGD.|
00000010 58 a2 9f f2 ab 80 ae 58 e8 08 8a cb a2 f8 1b 18 |X......X........|
[5a4a 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 26 02 ce 21 1e 7b e3 78 69 3d |0E.!..&..!.{.xi=|
00000010 9f 36 4a 1e b8 45 07 f4 bc 23 ba 3a 81 9b 0f 78 |.6J..E...#.:...x|
00000020 87 96 b5 a3 f8 02 20 72 2e d9 f8 a8 57 c6 2d fb |...... r....W.-.|
00000030 4b e7 5f 38 3c f2 7f 2b 14 75 58 ca 6f b4 50 0d |K._8<..+.uX.o.P.|
00000040 36 0f 9e 6f 06 fe 5e |6..o..^|
[5a4b 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[5a4c 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 24 45 ea ba 99 99 15 97 a8 0f 31 |0D. $E........1|
00000010 cd 2a 5e ba ef bc 69 6a 2e 2a a9 02 22 2e 4f 5d |.*^...ij.*..".O]|
00000020 ab c2 cb 23 02 20 73 eb 39 f9 5a 10 8f a7 01 0c |...#. s.9.Z.....|
00000030 e2 70 9f c4 60 cf 35 f5 7e b7 3c 89 8a 47 3f c4 |.p..`.5.~.<..G?.|
00000040 0f a3 ce 54 18 80 |...T..|
[5a4d 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5a4e 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[5a4f 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:74
[5a50 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:74
[5a51 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[5a52 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a53 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a54 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a55 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes
[5a56 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes
[5a57 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a58 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes
[5a59 02-22 00:15:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a5a 02-22 00:15:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes
[5a5b 02-22 00:15:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a5c 02-22 00:15:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes
[5a5d 02-22 00:15:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a5e 02-22 00:15:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a5f 02-22 00:15:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a60 02-22 00:15:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a61 02-22 00:15:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5a62 02-22 00:15:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a63 02-22 00:15:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5a64 02-22 00:15:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes
[5a65 02-22 00:15:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a66 02-22 00:15:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes
[5a67 02-22 00:15:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a68 02-22 00:15:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[5a69 02-22 00:15:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[5a6a 02-22 00:15:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a6b 02-22 00:15:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[5a6c 02-22 00:15:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[5a6d 02-22 00:15:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a6e 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5a6f 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5a70 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5a71 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5a72 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5a73 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5a74 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a db 61 12 1f 63 ce f4 5d 99 c7 56 ed 90 98 d0 |j.a..c..]..V....|
00000010 09 93 d6 75 da 8e 13 a0 18 24 2d 38 45 fa 73 97 |...u.....$-8E.s.|
[5a75 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 4d 51 ca 18 f3 49 91 60 3e 70 f5 |0D. LMQ...I.`>p.|
00000010 eb 19 d2 f7 94 e2 78 9e fe 0f be 7a 89 dc 31 e7 |......x....z..1.|
00000020 12 bc 36 7e 02 20 1b 6a 2a 8e d6 76 1c c8 31 65 |..6~. .j*..v..1e|
00000030 a8 e0 3c 73 2b 3a d6 ce 91 fc 4d 20 7d 55 b8 1e |..<s+:....M }U..|
00000040 8a 6f 2f 87 21 75 |.o/.!u|
[5a76 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5a77 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051285b0 gate 1582330549293177500 evaluation starts
[5a78 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051285b0 signed by 0 principal evaluation starts (used [false])
[5a79 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051285b0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5a7a 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051285b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5a7b 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051285b0 principal evaluation fails
[5a7c 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051285b0 gate 1582330549293177500 evaluation fails
[5a7d 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5a7e 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5a7f 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5a80 02-22 00:15:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a db 61 12 1f 63 ce f4 5d 99 c7 56 ed 90 98 d0 |j.a..c..]..V....|
00000010 09 93 d6 75 da 8e 13 a0 18 24 2d 38 45 fa 73 97 |...u.....$-8E.s.|
[5a81 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 4d 51 ca 18 f3 49 91 60 3e 70 f5 |0D. LMQ...I.`>p.|
00000010 eb 19 d2 f7 94 e2 78 9e fe 0f be 7a 89 dc 31 e7 |......x....z..1.|
00000020 12 bc 36 7e 02 20 1b 6a 2a 8e d6 76 1c c8 31 65 |..6~. .j*..v..1e|
00000030 a8 e0 3c 73 2b 3a d6 ce 91 fc 4d 20 7d 55 b8 1e |..<s+:....M }U..|
00000040 8a 6f 2f 87 21 75 |.o/.!u|
[5a82 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5a83 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005128eb0 gate 1582330549300879800 evaluation starts
[5a84 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005128eb0 signed by 0 principal evaluation starts (used [false])
[5a85 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005128eb0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5a86 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005128eb0 principal evaluation succeeds for identity 0
[5a87 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005128eb0 gate 1582330549300879800 evaluation succeeds
[5a88 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5a89 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5a8a 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5a8b 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5a8c 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[5a8d 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes]}
[5a8e 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:73
[5a8f 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:73
[5a90 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:72 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[5a91 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a92 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a93 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5a94 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a95 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a96 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a97 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a98 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a99 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a9a 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a9b 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5a9c 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5a9d 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5a9e 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[5a9f 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5aa0 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[5aa1 02-22 00:15:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5aa2 02-22 00:15:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[5aa3 02-22 00:15:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5aa4 02-22 00:15:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[5aa5 02-22 00:15:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5aa6 02-22 00:15:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[5aa7 02-22 00:15:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5aa8 02-22 00:15:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[5aa9 02-22 00:15:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5aaa 02-22 00:15:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[5aab 02-22 00:15:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[5aac 02-22 00:15:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA15101A1801
[5aad 02-22 00:15:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F7A8C4B2C94E0DFF221550E2F7B8ECBCFB5E74DC816281F6DC9AE45707333B10
[5aae 02-22 00:15:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[5aaf 02-22 00:15:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ab0 02-22 00:15:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ab1 02-22 00:15:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ab2 02-22 00:15:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ab3 02-22 00:15:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:26 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[5ab4 02-22 00:15:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ab5 02-22 00:15:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:26 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[5ab6 02-22 00:15:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ab7 02-22 00:15:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ab8 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[5ab9 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5aba 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[5abb 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[5abc 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5abd 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5abe 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5abf 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5ac0 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5ac1 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5ac2 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5ac3 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 96 ae b9 36 a3 8f 68 da 60 c8 b7 72 34 4b 87 |#...6..h.`..r4K.|
00000010 f2 bd 23 f4 18 a4 e2 52 0a 30 22 da f2 90 4d dc |..#....R.0"...M.|
[5ac4 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 3d 4a cd f9 e7 78 d7 80 ac 7e |0E.!..=J...x...~|
00000010 53 9b 20 48 cc 78 83 18 83 6b b1 d8 88 ae 52 97 |S. H.x...k....R.|
00000020 1a a4 62 87 3f 02 20 0e d2 06 a0 cc 91 ec 09 d9 |..b.?. .........|
00000030 b1 09 07 29 8a ea 3a af 68 81 be a2 82 59 ba 19 |...)..:.h....Y..|
00000040 0a d9 ce c8 6f 7d 3b |....o};|
[5ac5 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5ac6 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051766b0 gate 1582330549375608700 evaluation starts
[5ac7 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051766b0 signed by 0 principal evaluation starts (used [false])
[5ac8 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051766b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5ac9 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051766b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5aca 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051766b0 principal evaluation fails
[5acb 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051766b0 gate 1582330549375608700 evaluation fails
[5acc 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5acd 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5ace 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5acf 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 96 ae b9 36 a3 8f 68 da 60 c8 b7 72 34 4b 87 |#...6..h.`..r4K.|
00000010 f2 bd 23 f4 18 a4 e2 52 0a 30 22 da f2 90 4d dc |..#....R.0"...M.|
[5ad0 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 3d 4a cd f9 e7 78 d7 80 ac 7e |0E.!..=J...x...~|
00000010 53 9b 20 48 cc 78 83 18 83 6b b1 d8 88 ae 52 97 |S. H.x...k....R.|
00000020 1a a4 62 87 3f 02 20 0e d2 06 a0 cc 91 ec 09 d9 |..b.?. .........|
00000030 b1 09 07 29 8a ea 3a af 68 81 be a2 82 59 ba 19 |...)..:.h....Y..|
00000040 0a d9 ce c8 6f 7d 3b |....o};|
[5ad1 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5ad2 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005176fb0 gate 1582330549376652300 evaluation starts
[5ad3 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005176fb0 signed by 0 principal evaluation starts (used [false])
[5ad4 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005176fb0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5ad5 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005176fb0 principal evaluation succeeds for identity 0
[5ad6 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005176fb0 gate 1582330549376652300 evaluation succeeds
[5ad7 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5ad8 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5ad9 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5ada 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5adb 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[5adc 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes]}
[5add 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:71
[5ade 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:71
[5adf 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[5ae0 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ae1 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ae2 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ae3 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ae4 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ae5 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ae6 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ae7 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ae8 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ae9 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5aea 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5aeb 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5aec 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5aed 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[5aee 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5aef 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[5af0 02-22 00:15:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5af1 02-22 00:15:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[5af2 02-22 00:15:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[5af3 02-22 00:15:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5af4 02-22 00:15:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[5af5 02-22 00:15:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5af6 02-22 00:15:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[5af7 02-22 00:15:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5af8 02-22 00:15:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[5af9 02-22 00:15:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5afa 02-22 00:15:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151046
[5afb 02-22 00:15:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 72465A60EDF0CCDBC4526A73342678E8F28F1CDDA5471E40F0D89FE35C33236B
[5afc 02-22 00:15:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[5afd 02-22 00:15:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[5afe 02-22 00:15:49.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[5aff 02-22 00:15:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b00 02-22 00:15:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b01 02-22 00:15:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b02 02-22 00:15:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5b03 02-22 00:15:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[5b04 02-22 00:15:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b05 02-22 00:15:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5b06 02-22 00:15:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes
[5b07 02-22 00:15:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b08 02-22 00:15:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5b09 02-22 00:15:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b0a 02-22 00:15:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes
[5b0b 02-22 00:15:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b0c 02-22 00:15:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:1579672479228518214 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5b0d 02-22 00:15:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1579672479228518214 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5b0e 02-22 00:15:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b0f 02-22 00:15:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b10 02-22 00:15:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b11 02-22 00:15:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b12 02-22 00:15:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b13 02-22 00:15:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b14 02-22 00:15:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[5b15 02-22 00:15:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b16 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[5b17 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b18 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[5b19 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[5b1a 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 fa 88 95 53 db de 93 2a 73 47 e7 ea 65 af 6a |....S...*sG..e.j|
00000010 76 07 dd dc 57 b7 cd a1 90 b2 22 43 c4 80 6e 37 |v...W....."C..n7|
[5b1b 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 1a cc c1 d8 bc 8f 04 e7 0e 6d c6 |0D. u.........m.|
00000010 58 4d 16 85 f9 c4 de b1 58 00 c6 fb 5a f1 5c 89 |XM......X...Z.\.|
00000020 fd 55 72 35 02 20 52 9d ca 0e db 34 e3 28 f5 3f |.Ur5. R....4.(.?|
00000030 9c 1a 69 d7 3f f8 9e b3 bc 77 53 b6 5b c9 67 69 |..i.?....wS.[.gi|
00000040 15 a1 7e bc eb 46 |..~..F|
[5b1c 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[5b1d 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 2a 3e 0a df 5e 9b 05 79 42 55 |0E.!..*>..^..yBU|
00000010 82 9a 44 85 e2 04 16 4e ee 29 65 3d f1 62 c5 42 |..D....N.)e=.b.B|
00000020 64 bd 56 35 6c 02 20 59 52 a2 16 c6 cb 2c c5 96 |d.V5l. YR....,..|
00000030 c3 e0 41 f7 45 1d cc 89 1d 95 00 56 2c 39 23 7d |..A.E......V,9#}|
00000040 76 42 11 7e ee 38 30 |vB.~.80|
[5b1e 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5b1f 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[5b20 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:75
[5b21 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:75
[5b22 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[5b23 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b24 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b25 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b26 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[5b27 02-22 00:15:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b28 02-22 00:15:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b29 02-22 00:15:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[5b2a 02-22 00:15:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[5b2b 02-22 00:15:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[5b2c 02-22 00:15:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b2d 02-22 00:15:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:13066189929257088458 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5b2e 02-22 00:15:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:13066189929257088458 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5b2f 02-22 00:15:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13066189929257088458 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5b30 02-22 00:15:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b31 02-22 00:15:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b32 02-22 00:15:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b33 02-22 00:15:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b34 02-22 00:15:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b35 02-22 00:15:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b36 02-22 00:15:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[5b37 02-22 00:15:50.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b38 02-22 00:15:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:10795656897892275160 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5b39 02-22 00:15:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10795656897892275160 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5b3a 02-22 00:15:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[5b3b 02-22 00:15:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b3c 02-22 00:15:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[5b3d 02-22 00:15:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2530911394746610114 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[5b3e 02-22 00:15:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[5b3f 02-22 00:15:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2530911394746610114 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5b41 02-22 00:15:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:4566080428562681108 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[5b42 02-22 00:15:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[5b43 02-22 00:15:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:15652152397315538494 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[5b44 02-22 00:15:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:15652152397315538494 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5b45 02-22 00:15:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b40 02-22 00:15:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b46 02-22 00:15:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:4566080428562681108 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5b47 02-22 00:15:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b48 02-22 00:15:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2530911394746610114 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[5b49 02-22 00:15:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2530911394746610114 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[5b4a 02-22 00:15:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b4b 02-22 00:15:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4566080428562681108 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[5b4c 02-22 00:15:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4566080428562681108 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[5b4d 02-22 00:15:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b4e 02-22 00:15:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15652152397315538494 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[5b4f 02-22 00:15:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15652152397315538494 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[5b50 02-22 00:15:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15652152397315538494 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[5b51 02-22 00:15:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b52 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5b53 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5b54 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b55 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5b56 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[5b57 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b58 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5b59 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5b5a 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5b5b 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5b5c 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5b5d 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5b5e 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 6e e6 c4 16 f2 90 a3 a6 8b 18 e8 8f dd ba 37 |gn.............7|
00000010 5d a4 6e f7 7d 5c 1d bd f7 6a 2b 59 17 f9 f0 18 |].n.}\...j+Y....|
[5b5f 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad 50 5c 97 ff 7b be 90 eb 52 12 |0E.!..P\..{...R.|
00000010 a8 8a 1d 75 f1 e5 29 36 d5 90 5d ee b2 9d b6 31 |...u..)6..]....1|
00000020 05 69 88 b2 aa 02 20 54 83 a3 5b 22 e3 dd 85 c6 |.i.... T..["....|
00000030 e2 8d 7a b2 89 8a ec 89 25 c3 82 f6 e0 95 55 ef |..z.....%.....U.|
00000040 7e 88 86 04 92 20 42 |~.... B|
[5b60 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5b61 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005206320 gate 1582330550469504600 evaluation starts
[5b62 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005206320 signed by 0 principal evaluation starts (used [false])
[5b63 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005206320 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5b64 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005206320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5b65 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005206320 principal evaluation fails
[5b66 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005206320 gate 1582330550469504600 evaluation fails
[5b67 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5b68 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5b69 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5b6a 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 6e e6 c4 16 f2 90 a3 a6 8b 18 e8 8f dd ba 37 |gn.............7|
00000010 5d a4 6e f7 7d 5c 1d bd f7 6a 2b 59 17 f9 f0 18 |].n.}\...j+Y....|
[5b6b 02-22 00:15:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad 50 5c 97 ff 7b be 90 eb 52 12 |0E.!..P\..{...R.|
00000010 a8 8a 1d 75 f1 e5 29 36 d5 90 5d ee b2 9d b6 31 |...u..)6..]....1|
00000020 05 69 88 b2 aa 02 20 54 83 a3 5b 22 e3 dd 85 c6 |.i.... T..["....|
00000030 e2 8d 7a b2 89 8a ec 89 25 c3 82 f6 e0 95 55 ef |..z.....%.....U.|
00000040 7e 88 86 04 92 20 42 |~.... B|
[5b6c 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5b6d 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005206c20 gate 1582330550470071000 evaluation starts
[5b6e 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005206c20 signed by 0 principal evaluation starts (used [false])
[5b6f 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005206c20 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5b70 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005206c20 principal evaluation succeeds for identity 0
[5b71 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005206c20 gate 1582330550470071000 evaluation succeeds
[5b72 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5b73 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5b74 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5b75 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5b76 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes
[5b77 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes]}
[5b78 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:74
[5b79 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:74
[5b7a 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[5b7b 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b7c 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b7d 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b7e 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[5b7f 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b80 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b81 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b82 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[5b83 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[5b84 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[5b85 02-22 00:15:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b86 02-22 00:15:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151047
[5b87 02-22 00:15:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8172990F4CDB079001875D9733947C1B41876482F9960CE19998242F185E4098
[5b88 02-22 00:15:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[5b89 02-22 00:15:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[5b8a 02-22 00:15:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b8b 02-22 00:15:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[5b8c 02-22 00:15:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[5b8d 02-22 00:15:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5b8e 02-22 00:15:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[5b8f 02-22 00:15:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5b90 02-22 00:15:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b91 02-22 00:15:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5b92 02-22 00:15:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b93 02-22 00:15:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[5b94 02-22 00:15:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b95 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[5b96 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5b97 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[5b98 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[5b99 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 72 99 0f 4c db 07 90 01 87 5d 97 33 94 7c 1b |.r..L.....].3.|.|
00000010 41 87 64 82 f9 96 0c e1 99 98 24 2f 18 5e 40 98 |A.d.......$/.^@.|
[5b9a 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 19 08 23 5a 36 1a 02 20 e9 1f |0E.!....#Z6.. ..|
00000010 75 6c da e1 7a 7f eb 09 9e 27 9a 7e 3d 71 d7 f2 |ul..z....'.~=q..|
00000020 82 fb 75 f2 b5 02 20 39 85 98 0a a2 33 09 3b 34 |..u... 9....3.;4|
00000030 c8 0b 39 2a bf d4 7b 10 25 5b 42 b4 b6 c4 d1 99 |..9*..{.%[B.....|
00000040 71 5a be 3b d6 18 c8 |qZ.;...|
[5b9b 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[5b9c 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba f4 2a bc d6 8e 90 48 75 df 9d |0E.!...*....Hu..|
00000010 40 27 e7 0c ac 5c 18 5b 2e 4f 91 40 78 22 0b 63 |@'...\.[.O.@x".c|
00000020 ff 67 33 5c 88 02 20 2d 11 6d cb 6b 38 22 8d 65 |.g3\.. -.m.k8".e|
00000030 09 44 c9 97 dd e2 aa 7a e1 04 6e 55 1f b3 c8 a7 |.D.....z..nU....|
00000040 82 86 f8 1c 55 78 3d |....Ux=|
[5b9d 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5b9e 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5b9f 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ba0 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ba1 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[5ba2 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ba3 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[5ba4 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[5ba5 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 72 99 0f 4c db 07 90 01 87 5d 97 33 94 7c 1b |.r..L.....].3.|.|
00000010 41 87 64 82 f9 96 0c e1 99 98 24 2f 18 5e 40 98 |A.d.......$/.^@.|
[5ba6 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 19 08 23 5a 36 1a 02 20 e9 1f |0E.!....#Z6.. ..|
00000010 75 6c da e1 7a 7f eb 09 9e 27 9a 7e 3d 71 d7 f2 |ul..z....'.~=q..|
00000020 82 fb 75 f2 b5 02 20 39 85 98 0a a2 33 09 3b 34 |..u... 9....3.;4|
00000030 c8 0b 39 2a bf d4 7b 10 25 5b 42 b4 b6 c4 d1 99 |..9*..{.%[B.....|
00000040 71 5a be 3b d6 18 c8 |qZ.;...|
[5ba7 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[5ba8 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[5ba9 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5baa 02-22 00:15:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[5bab 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 fa 88 95 53 db de 93 2a 73 47 e7 ea 65 af 6a |....S...*sG..e.j|
00000010 76 07 dd dc 57 b7 cd a1 90 b2 22 43 c4 80 6e 37 |v...W....."C..n7|
[5bac 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 1a cc c1 d8 bc 8f 04 e7 0e 6d c6 |0D. u.........m.|
00000010 58 4d 16 85 f9 c4 de b1 58 00 c6 fb 5a f1 5c 89 |XM......X...Z.\.|
00000020 fd 55 72 35 02 20 52 9d ca 0e db 34 e3 28 f5 3f |.Ur5. R....4.(.?|
00000030 9c 1a 69 d7 3f f8 9e b3 bc 77 53 b6 5b c9 67 69 |..i.?....wS.[.gi|
00000040 15 a1 7e bc eb 46 |..~..F|
[5bad 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5bae 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5baf 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[5bb0 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5bb1 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5bb2 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5bb3 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5bb4 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5bb5 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5bb6 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5bb7 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 6e e6 c4 16 f2 90 a3 a6 8b 18 e8 8f dd ba 37 |gn.............7|
00000010 5d a4 6e f7 7d 5c 1d bd f7 6a 2b 59 17 f9 f0 18 |].n.}\...j+Y....|
[5bb8 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad 50 5c 97 ff 7b be 90 eb 52 12 |0E.!..P\..{...R.|
00000010 a8 8a 1d 75 f1 e5 29 36 d5 90 5d ee b2 9d b6 31 |...u..)6..]....1|
00000020 05 69 88 b2 aa 02 20 54 83 a3 5b 22 e3 dd 85 c6 |.i.... T..["....|
00000030 e2 8d 7a b2 89 8a ec 89 25 c3 82 f6 e0 95 55 ef |..z.....%.....U.|
00000040 7e 88 86 04 92 20 42 |~.... B|
[5bb9 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5bba 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005259450 gate 1582330550581111500 evaluation starts
[5bbb 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005259450 signed by 0 principal evaluation starts (used [false])
[5bbc 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005259450 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5bbd 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005259450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5bbe 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005259450 principal evaluation fails
[5bbf 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005259450 gate 1582330550581111500 evaluation fails
[5bc0 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5bc1 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5bc2 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5bc3 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 6e e6 c4 16 f2 90 a3 a6 8b 18 e8 8f dd ba 37 |gn.............7|
00000010 5d a4 6e f7 7d 5c 1d bd f7 6a 2b 59 17 f9 f0 18 |].n.}\...j+Y....|
[5bc4 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad 50 5c 97 ff 7b be 90 eb 52 12 |0E.!..P\..{...R.|
00000010 a8 8a 1d 75 f1 e5 29 36 d5 90 5d ee b2 9d b6 31 |...u..)6..]....1|
00000020 05 69 88 b2 aa 02 20 54 83 a3 5b 22 e3 dd 85 c6 |.i.... T..["....|
00000030 e2 8d 7a b2 89 8a ec 89 25 c3 82 f6 e0 95 55 ef |..z.....%.....U.|
00000040 7e 88 86 04 92 20 42 |~.... B|
[5bc5 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5bc6 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005259d50 gate 1582330550581675800 evaluation starts
[5bc7 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005259d50 signed by 0 principal evaluation starts (used [false])
[5bc8 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005259d50 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5bc9 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005259d50 principal evaluation succeeds for identity 0
[5bca 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005259d50 gate 1582330550581675800 evaluation succeeds
[5bcb 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5bcc 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5bcd 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5bce 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5bcf 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes
[5bd0 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5bd1 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5bd2 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[5bd3 02-22 00:15:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[5bd4 02-22 00:15:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[5bd5 02-22 00:15:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[5bd6 02-22 00:15:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 72 99 0f 4c db 07 90 01 87 5d 97 33 94 7c 1b |.r..L.....].3.|.|
00000010 41 87 64 82 f9 96 0c e1 99 98 24 2f 18 5e 40 98 |A.d.......$/.^@.|
[5bd7 02-22 00:15:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 19 08 23 5a 36 1a 02 20 e9 1f |0E.!....#Z6.. ..|
00000010 75 6c da e1 7a 7f eb 09 9e 27 9a 7e 3d 71 d7 f2 |ul..z....'.~=q..|
00000020 82 fb 75 f2 b5 02 20 39 85 98 0a a2 33 09 3b 34 |..u... 9....3.;4|
00000030 c8 0b 39 2a bf d4 7b 10 25 5b 42 b4 b6 c4 d1 99 |..9*..{.%[B.....|
00000040 71 5a be 3b d6 18 c8 |qZ.;...|
[5bd8 02-22 00:15:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[5bd9 02-22 00:15:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes
[5bda 02-22 00:15:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5bdb 02-22 00:15:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[5bdc 02-22 00:15:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 fa 88 95 53 db de 93 2a 73 47 e7 ea 65 af 6a |....S...*sG..e.j|
00000010 76 07 dd dc 57 b7 cd a1 90 b2 22 43 c4 80 6e 37 |v...W....."C..n7|
[5bdd 02-22 00:15:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 1a cc c1 d8 bc 8f 04 e7 0e 6d c6 |0D. u.........m.|
00000010 58 4d 16 85 f9 c4 de b1 58 00 c6 fb 5a f1 5c 89 |XM......X...Z.\.|
00000020 fd 55 72 35 02 20 52 9d ca 0e db 34 e3 28 f5 3f |.Ur5. R....4.(.?|
00000030 9c 1a 69 d7 3f f8 9e b3 bc 77 53 b6 5b c9 67 69 |..i.?....wS.[.gi|
00000040 15 a1 7e bc eb 46 |..~..F|
[5bde 02-22 00:15:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5bdf 02-22 00:15:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5be0 02-22 00:15:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5be1 02-22 00:15:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5be2 02-22 00:15:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[5be3 02-22 00:15:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5be4 02-22 00:15:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[5be5 02-22 00:15:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[5be6 02-22 00:15:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5be7 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5be8 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5be9 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5bea 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5beb 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5bec 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5bed 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4c 40 a1 ff c5 51 64 12 d8 8c f3 9e 64 a4 74 79 |L@...Qd.....d.ty|
00000010 6b 13 72 a4 75 7d 63 80 64 d2 30 03 aa 62 77 fb |k.r.u}c.d.0..bw.|
[5bee 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 58 62 a5 66 be 2a 60 34 6b 6c ae |0D. 2Xb.f.*`4kl.|
00000010 24 63 a5 18 38 42 5b b4 9e 89 40 f4 23 98 56 79 |$c..8B[...@.#.Vy|
00000020 3d 96 16 e7 02 20 76 b8 e5 ac 9f a5 11 06 7e 62 |=.... v.......~b|
00000030 4e 51 93 7c 54 f5 b8 2e 5f a5 09 af e7 24 26 f0 |NQ.|T..._....$&.|
00000040 44 28 62 b8 03 29 |D(b..)|
[5bef 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5bf0 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527f4d0 gate 1582330550642630800 evaluation starts
[5bf1 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527f4d0 signed by 0 principal evaluation starts (used [false])
[5bf2 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527f4d0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5bf3 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527f4d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5bf4 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527f4d0 principal evaluation fails
[5bf5 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527f4d0 gate 1582330550642630800 evaluation fails
[5bf6 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5bf7 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5bf8 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5bf9 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4c 40 a1 ff c5 51 64 12 d8 8c f3 9e 64 a4 74 79 |L@...Qd.....d.ty|
00000010 6b 13 72 a4 75 7d 63 80 64 d2 30 03 aa 62 77 fb |k.r.u}c.d.0..bw.|
[5bfa 02-22 00:15:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 58 62 a5 66 be 2a 60 34 6b 6c ae |0D. 2Xb.f.*`4kl.|
00000010 24 63 a5 18 38 42 5b b4 9e 89 40 f4 23 98 56 79 |$c..8B[...@.#.Vy|
00000020 3d 96 16 e7 02 20 76 b8 e5 ac 9f a5 11 06 7e 62 |=.... v.......~b|
00000030 4e 51 93 7c 54 f5 b8 2e 5f a5 09 af e7 24 26 f0 |NQ.|T..._....$&.|
00000040 44 28 62 b8 03 29 |D(b..)|
[5bfb 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5bfc 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527fdd0 gate 1582330550654476200 evaluation starts
[5bfd 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527fdd0 signed by 0 principal evaluation starts (used [false])
[5bfe 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527fdd0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5bff 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527fdd0 principal evaluation succeeds for identity 0
[5c00 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527fdd0 gate 1582330550654476200 evaluation succeeds
[5c01 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5c02 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5c03 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5c04 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5c05 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes
[5c06 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes]}
[5c07 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:72
[5c08 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:72
[5c09 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:71 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[5c0a 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c0b 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c0c 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c0d 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[5c0e 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c0f 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c10 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c11 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[5c12 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[5c13 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[5c14 02-22 00:15:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c15 02-22 00:15:51.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c16 02-22 00:15:51.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c17 02-22 00:15:51.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[5c18 02-22 00:15:51.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[5c19 02-22 00:15:51.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[5c1a 02-22 00:15:51.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c1b 02-22 00:15:51.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[5c1c 02-22 00:15:51.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c1d 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[5c1e 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c20 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[5c21 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c22 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c1f 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c23 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5c24 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5c25 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5c26 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5c27 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5c28 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5c29 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5c2a 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5c2b 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5c2c 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052be280 gate 1582330551018518300 evaluation starts
[5c2d 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052be280 signed by 0 principal evaluation starts (used [false])
[5c2e 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052be280 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5c2f 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052be280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5c30 02-22 00:15:51.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052be280 principal evaluation fails
[5c31 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052be280 gate 1582330551018518300 evaluation fails
[5c32 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5c33 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5c34 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5c35 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5c36 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5c37 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5c38 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052beb80 gate 1582330551022262900 evaluation starts
[5c39 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052beb80 signed by 0 principal evaluation starts (used [false])
[5c3a 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052beb80 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5c3b 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052beb80 principal evaluation succeeds for identity 0
[5c3c 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052beb80 gate 1582330551022262900 evaluation succeeds
[5c3d 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5c3e 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5c3f 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5c40 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5c41 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[5c42 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[5c43 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[5c44 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[5c45 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c46 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c47 02-22 00:15:51.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5c48 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5c49 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5c4a 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5c4b 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5c4c 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5c4d 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5c4e 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5c4f 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5c50 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052d3340 gate 1582330551033202000 evaluation starts
[5c51 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052d3340 signed by 0 principal evaluation starts (used [false])
[5c52 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052d3340 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5c53 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052d3340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5c54 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052d3340 principal evaluation fails
[5c55 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052d3340 gate 1582330551033202000 evaluation fails
[5c56 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5c57 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5c58 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5c59 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5c5a 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5c5b 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5c5c 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052d3c40 gate 1582330551036439900 evaluation starts
[5c5d 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052d3c40 signed by 0 principal evaluation starts (used [false])
[5c5e 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052d3c40 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5c5f 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052d3c40 principal evaluation succeeds for identity 0
[5c60 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052d3c40 gate 1582330551036439900 evaluation succeeds
[5c61 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5c62 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5c63 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5c64 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5c65 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5c66 02-22 00:15:51.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[5c67 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c68 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c69 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c6a 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5c6b 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5c6c 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5c6d 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5c6e 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5c6f 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5c70 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5c71 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5c72 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5c73 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052ed950 gate 1582330551043663900 evaluation starts
[5c74 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052ed950 signed by 0 principal evaluation starts (used [false])
[5c75 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052ed950 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5c76 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052ed950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5c77 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052ed950 principal evaluation fails
[5c78 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052ed950 gate 1582330551043663900 evaluation fails
[5c79 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5c7a 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5c7b 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5c7c 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5c7d 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5c7e 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5c7f 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005308250 gate 1582330551044192700 evaluation starts
[5c80 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005308250 signed by 0 principal evaluation starts (used [false])
[5c81 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005308250 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5c82 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005308250 principal evaluation succeeds for identity 0
[5c83 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005308250 gate 1582330551044192700 evaluation succeeds
[5c84 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5c85 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5c86 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5c87 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5c88 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[5c89 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[5c8a 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c8b 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5c8c 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5c8d 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5c8e 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5c8f 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5c90 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5c91 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5c92 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5c93 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5c94 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5c95 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531e360 gate 1582330551045470800 evaluation starts
[5c96 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531e360 signed by 0 principal evaluation starts (used [false])
[5c97 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531e360 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5c98 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531e360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5c99 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531e360 principal evaluation fails
[5c9a 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531e360 gate 1582330551045470800 evaluation fails
[5c9b 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5c9c 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5c9d 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5c9e 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5c9f 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5ca0 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5ca1 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531ec60 gate 1582330551045896900 evaluation starts
[5ca2 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531ec60 signed by 0 principal evaluation starts (used [false])
[5ca3 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531ec60 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5ca4 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531ec60 principal evaluation succeeds for identity 0
[5ca5 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00531ec60 gate 1582330551045896900 evaluation succeeds
[5ca6 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5ca7 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5ca8 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5ca9 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5caa 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[5cab 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[5cac 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5cad 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[5cae 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[5caf 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[5cb0 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[5cb1 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[5cb2 02-22 00:15:51.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5cb3 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5cb4 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5cb5 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5cb6 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5cb7 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5cb8 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5cb9 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5cba 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5cbb 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5cbc 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5cbd 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337cb0 gate 1582330551052966200 evaluation starts
[5cbe 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337cb0 signed by 0 principal evaluation starts (used [false])
[5cbf 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337cb0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5cc0 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5cc1 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337cb0 principal evaluation fails
[5cc2 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337cb0 gate 1582330551052966200 evaluation fails
[5cc3 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5cc4 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5cc5 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5cc6 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5cc7 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5cc8 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5cc9 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534c5b0 gate 1582330551055785600 evaluation starts
[5cca 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534c5b0 signed by 0 principal evaluation starts (used [false])
[5ccb 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534c5b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5ccc 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534c5b0 principal evaluation succeeds for identity 0
[5ccd 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534c5b0 gate 1582330551055785600 evaluation succeeds
[5cce 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5ccf 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5cd0 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5cd1 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5cd2 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5cd3 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5cd4 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5cd5 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5cd6 02-22 00:15:51.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5cd7 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5cd8 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5cd9 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5cda 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5cdb 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5cdc 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5cdd 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005368010 gate 1582330551061763200 evaluation starts
[5cde 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005368010 signed by 0 principal evaluation starts (used [false])
[5cdf 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005368010 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5ce0 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005368010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5ce1 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005368010 principal evaluation fails
[5ce2 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005368010 gate 1582330551061763200 evaluation fails
[5ce3 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5ce4 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5ce5 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5ce6 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5ce7 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5ce8 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5ce9 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005368910 gate 1582330551064592500 evaluation starts
[5cea 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005368910 signed by 0 principal evaluation starts (used [false])
[5ceb 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005368910 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5cec 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005368910 principal evaluation succeeds for identity 0
[5ced 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005368910 gate 1582330551064592500 evaluation succeeds
[5cee 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5cef 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5cf0 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5cf1 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5cf2 02-22 00:15:51.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5cf3 02-22 00:15:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5cf4 02-22 00:15:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5cf5 02-22 00:15:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[5cf6 02-22 00:15:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5cf7 02-22 00:15:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5cf8 02-22 00:15:51.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:17671963803977923496 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[5cf9 02-22 00:15:51.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:17671963803977923496 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[5cfa 02-22 00:15:51.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5cfb 02-22 00:15:51.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17671963803977923496 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[5cfc 02-22 00:15:51.16 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17671963803977923496 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[5cfd 02-22 00:15:51.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5cfe 02-22 00:15:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[5cff 02-22 00:15:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d00 02-22 00:15:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d01 02-22 00:15:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d02 02-22 00:15:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:615744547883474274 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[5d03 02-22 00:15:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:615744547883474274 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[5d04 02-22 00:15:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[5d05 02-22 00:15:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d06 02-22 00:15:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[5d07 02-22 00:15:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d08 02-22 00:15:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d09 02-22 00:15:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d0a 02-22 00:15:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d0b 02-22 00:15:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[5d0c 02-22 00:15:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[5d0d 02-22 00:15:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d0e 02-22 00:15:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d0f 02-22 00:15:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d10 02-22 00:15:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d11 02-22 00:15:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:13116281689479000921 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5d12 02-22 00:15:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13116281689479000921 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5d13 02-22 00:15:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d14 02-22 00:15:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d15 02-22 00:15:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d16 02-22 00:15:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d17 02-22 00:15:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d18 02-22 00:15:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d19 02-22 00:15:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[5d1a 02-22 00:15:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d1b 02-22 00:15:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5d1c 02-22 00:15:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d1d 02-22 00:15:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5d1e 02-22 00:15:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[5d1f 02-22 00:15:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 f3 32 89 47 38 a7 4f c0 29 39 6c 6b e1 7b 52 |`.2.G8.O.)9lk.{R|
00000010 6f 8b 07 35 73 59 fb 38 3d 44 e0 a2 2f a6 ef d8 |o..5sY.8=D../...|
[5d20 02-22 00:15:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b 2f f6 16 8b c2 09 ba de fe 81 54 |0D. K/.........T|
00000010 0a 68 c4 02 2c c6 2e 2a 9f a6 60 53 e0 e2 91 fc |.h..,..*..`S....|
00000020 f5 dc 47 1f 02 20 44 c4 b8 b6 b0 be 5f d1 c0 51 |..G.. D....._..Q|
00000030 b4 d3 a6 ed b4 c6 5f 34 b4 4b fb 0e 39 5e 51 71 |......_4.K..9^Qq|
00000040 6b f7 c8 b7 0b 7e |k....~|
[5d21 02-22 00:15:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[5d22 02-22 00:15:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 86 5e 93 b6 62 1b 44 f8 94 06 1a |0D. *.^..b.D....|
00000010 d7 5d ca 0a 97 3b 16 40 5f ba ac 9f 77 fd 58 c6 |.]...;.@_...w.X.|
00000020 0f 67 e1 ea 02 20 06 01 c4 54 fb 5f 5d a3 eb b2 |.g... ...T._]...|
00000030 ba d7 ee e9 a5 da 04 71 97 0c 02 30 c4 82 38 3f |.......q...0..8?|
00000040 93 b4 4a 7d cb 4b |..J}.K|
[5d23 02-22 00:15:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5d24 02-22 00:15:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[5d25 02-22 00:15:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:76
[5d26 02-22 00:15:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:76
[5d27 02-22 00:15:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[5d28 02-22 00:15:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d29 02-22 00:15:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d2a 02-22 00:15:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d2b 02-22 00:15:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes
[5d2c 02-22 00:15:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d2d 02-22 00:15:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes
[5d2e 02-22 00:15:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d2f 02-22 00:15:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d30 02-22 00:15:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d31 02-22 00:15:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d32 02-22 00:15:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5d33 02-22 00:15:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d34 02-22 00:15:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5d35 02-22 00:15:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes
[5d36 02-22 00:15:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes
[5d37 02-22 00:15:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d38 02-22 00:15:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d39 02-22 00:15:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes
[5d3a 02-22 00:15:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes
[5d3b 02-22 00:15:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d3c 02-22 00:15:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes
[5d3d 02-22 00:15:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d3e 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5d3f 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5d40 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d41 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5d42 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[5d43 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d44 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5d45 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5d46 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5d47 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5d48 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5d49 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5d4a 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe 8d fd be b0 96 28 92 5d d7 6b 4a 3b 48 a3 eb |......(.].kJ;H..|
00000010 b8 61 63 df b9 d1 96 a3 b8 ac fe a0 96 94 64 fa |.ac...........d.|
[5d4b 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 74 39 e7 f0 24 7c 25 31 0d e2 6d |0D. ot9..$|%1..m|
00000010 4b 47 7c 2f df 7e 52 b9 59 98 3c 39 8e 40 41 d5 |KG|/.~R.Y.<9.@A.|
00000020 04 81 de a5 02 20 3f 93 fd 7f 10 c2 5c ee 09 19 |..... ?.....\...|
00000030 6c f3 80 69 c8 f0 01 c9 5d 72 9c 9a b9 e4 96 ba |l..i....]r......|
00000040 b7 22 8e 1c 0a c1 |."....|
[5d4c 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5d4d 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005393bb0 gate 1582330554294161600 evaluation starts
[5d4e 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005393bb0 signed by 0 principal evaluation starts (used [false])
[5d4f 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005393bb0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5d50 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005393bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5d51 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005393bb0 principal evaluation fails
[5d52 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005393bb0 gate 1582330554294161600 evaluation fails
[5d53 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5d54 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5d55 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5d56 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe 8d fd be b0 96 28 92 5d d7 6b 4a 3b 48 a3 eb |......(.].kJ;H..|
00000010 b8 61 63 df b9 d1 96 a3 b8 ac fe a0 96 94 64 fa |.ac...........d.|
[5d57 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 74 39 e7 f0 24 7c 25 31 0d e2 6d |0D. ot9..$|%1..m|
00000010 4b 47 7c 2f df 7e 52 b9 59 98 3c 39 8e 40 41 d5 |KG|/.~R.Y.<9.@A.|
00000020 04 81 de a5 02 20 3f 93 fd 7f 10 c2 5c ee 09 19 |..... ?.....\...|
00000030 6c f3 80 69 c8 f0 01 c9 5d 72 9c 9a b9 e4 96 ba |l..i....]r......|
00000040 b7 22 8e 1c 0a c1 |."....|
[5d58 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5d59 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053e44b0 gate 1582330554294766700 evaluation starts
[5d5a 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053e44b0 signed by 0 principal evaluation starts (used [false])
[5d5b 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053e44b0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5d5c 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053e44b0 principal evaluation succeeds for identity 0
[5d5d 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053e44b0 gate 1582330554294766700 evaluation succeeds
[5d5e 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5d5f 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5d60 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5d61 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5d62 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5d63 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes]}
[5d64 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:75
[5d65 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:75
[5d66 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:74 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[5d67 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d68 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d69 02-22 00:15:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d6a 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5d6b 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d6c 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5d6d 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d6e 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d6f 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d70 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d71 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d72 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d73 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d74 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5d75 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d76 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d77 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5d78 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5d79 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d7a 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5d7b 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d7c 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5d7d 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d7e 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[5d7f 02-22 00:15:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d80 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[5d81 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d82 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[5d83 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[5d84 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 a3 3c cc f4 c0 b6 02 6e 74 c8 c0 b8 e3 f9 82 |..<.....nt......|
00000010 41 9c f1 a2 91 87 87 dd 5c 6d e1 2e 82 37 66 4c |A.......\m...7fL|
[5d85 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 1a 37 6d cf 5a fb a6 77 49 58 bc |0D. e.7m.Z..wIX.|
00000010 89 69 3c 04 f1 4c e5 04 af 43 b6 73 dc 9f c2 50 |.i<..L...C.s...P|
00000020 bc c9 ed 67 02 20 71 99 b5 55 33 b3 b3 5c e8 bb |...g. q..U3..\..|
00000030 6c b9 3a 5a 67 7f 20 8a 54 ee 99 75 2f 62 2c 4a |l.:Zg. .T..u/b,J|
00000040 91 fe bb 1f d2 b3 |......|
[5d86 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[5d87 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 4b 34 27 04 10 29 4e 31 92 2c |0E.!..K4'..)N1.,|
00000010 b6 a0 26 29 20 88 3b 6d 5e c0 6b 41 e5 96 e9 14 |..&) .;m^.kA....|
00000020 cf 1f a3 2e 61 02 20 50 f5 1c 04 26 10 7f b5 f6 |....a. P...&....|
00000030 2a 44 16 df f5 62 ed c4 0e 5d cb 12 5d cc 5c ee |*D...b...]..].\.|
00000040 28 c8 1e e1 5c 88 db |(...\..|
[5d88 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5d89 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[5d8a 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:77
[5d8b 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:77
[5d8c 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[5d8d 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d8e 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d8f 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d90 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[5d91 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d92 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d93 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[5d94 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[5d95 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[5d96 02-22 00:15:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5d97 02-22 00:15:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[5d98 02-22 00:15:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[5d99 02-22 00:15:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA15101B1801
[5d9a 02-22 00:15:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 96399C4C6F9ACC97284D5D953EE0094BC9F25659AFC52B3ABEF9FE8ECA6756B8
[5d9b 02-22 00:15:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[5d9c 02-22 00:15:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d9d 02-22 00:15:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d9e 02-22 00:15:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5d9f 02-22 00:15:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5da0 02-22 00:15:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:27 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[5da1 02-22 00:15:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5da2 02-22 00:15:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5da3 02-22 00:15:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:27 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[5da4 02-22 00:15:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5da5 02-22 00:15:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:5910532013203871572 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5da6 02-22 00:15:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:5910532013203871572 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5da7 02-22 00:15:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:5910532013203871572 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5da8 02-22 00:15:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5da9 02-22 00:15:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5daa 02-22 00:15:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5dab 02-22 00:15:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5dac 02-22 00:15:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5dad 02-22 00:15:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5dae 02-22 00:15:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[5daf 02-22 00:15:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5db0 02-22 00:15:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:1940320329798927296 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5db1 02-22 00:15:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1940320329798927296 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5db2 02-22 00:15:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[5db3 02-22 00:15:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5db4 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5db6 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5db7 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[5db8 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5db9 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5dba 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5dbb 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5dbc 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5dbd 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5dbe 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5dbf 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 a9 e7 3f 92 94 91 77 8e 02 05 34 8f 9d 3e 5c |...?...w...4..>\|
00000010 85 85 c5 ac 19 cb 05 e4 ff 84 71 4e 77 b4 84 29 |..........qNw..)|
[5dc0 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae c5 a8 d7 1b 79 be 50 ab 7a e8 |0E.!......y.P.z.|
00000010 36 32 fb ed de 43 e9 b7 23 9d fb 65 a2 e4 65 84 |62...C..#..e..e.|
00000020 83 89 8a 7b 88 02 20 13 ce 4e ed 5a 81 00 c6 f7 |...{.. ..N.Z....|
00000030 7b ed 90 5f 4c 23 58 76 9c f2 3f e0 19 86 04 a9 |{.._L#Xv..?.....|
00000040 38 71 83 d0 fd 38 ce |8q...8.|
[5dc1 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5dc2 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005441240 gate 1582330554368930100 evaluation starts
[5dc3 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005441240 signed by 0 principal evaluation starts (used [false])
[5dc4 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005441240 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5dc5 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005441240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5dc6 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005441240 principal evaluation fails
[5dc7 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005441240 gate 1582330554368930100 evaluation fails
[5dc8 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5dc9 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5dca 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5dcb 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 a9 e7 3f 92 94 91 77 8e 02 05 34 8f 9d 3e 5c |...?...w...4..>\|
00000010 85 85 c5 ac 19 cb 05 e4 ff 84 71 4e 77 b4 84 29 |..........qNw..)|
[5dcc 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae c5 a8 d7 1b 79 be 50 ab 7a e8 |0E.!......y.P.z.|
00000010 36 32 fb ed de 43 e9 b7 23 9d fb 65 a2 e4 65 84 |62...C..#..e..e.|
00000020 83 89 8a 7b 88 02 20 13 ce 4e ed 5a 81 00 c6 f7 |...{.. ..N.Z....|
00000030 7b ed 90 5f 4c 23 58 76 9c f2 3f e0 19 86 04 a9 |{.._L#Xv..?.....|
00000040 38 71 83 d0 fd 38 ce |8q...8.|
[5db5 02-22 00:15:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5dcd 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5dce 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005441b40 gate 1582330554370678600 evaluation starts
[5dcf 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005441b40 signed by 0 principal evaluation starts (used [false])
[5dd0 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005441b40 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5dd1 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005441b40 principal evaluation succeeds for identity 0
[5dd2 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005441b40 gate 1582330554370678600 evaluation succeeds
[5dd3 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5dd4 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5dd5 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5dd6 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5dd7 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5dd8 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes]}
[5dd9 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:73
[5dda 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:73
[5ddb 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[5ddc 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ddd 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5dde 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ddf 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5de0 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5de1 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5de2 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5de3 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5de4 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5de5 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5de6 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5de7 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5de8 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[5de9 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5dea 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5deb 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5dec 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ded 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5dee 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5def 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5df0 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5df1 02-22 00:15:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5df2 02-22 00:15:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5df3 02-22 00:15:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5df4 02-22 00:15:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes
[5df5 02-22 00:15:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5df6 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[5df7 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:9443649633044029633 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[5df8 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[5df9 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:9003952538607846870 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[5dfa 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[5dfb 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:8064820260041110585 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[5dfc 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:8064820260041110585 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5dfd 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5dfe 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:9443649633044029633 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[5dff 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e00 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:9003952538607846870 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[5e01 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e02 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9003952538607846870 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[5e03 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9003952538607846870 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[5e04 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e05 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9443649633044029633 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[5e06 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9443649633044029633 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[5e07 02-22 00:15:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e08 02-22 00:15:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8064820260041110585 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[5e09 02-22 00:15:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8064820260041110585 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[5e0a 02-22 00:15:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8064820260041110585 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[5e0b 02-22 00:15:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e0c 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5e0d 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5e0e 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e0f 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[5e10 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[5e11 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e12 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5e13 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5e14 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5e15 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5e16 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5e17 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5e18 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 14 4a 1e d5 7d bb 56 e4 ec 01 bf 6b 25 a5 f7 |..J..}.V....k%..|
00000010 2e cb fd b2 32 98 49 af 14 9b 6b 4c a9 23 d6 72 |....2.I...kL.#.r|
[5e19 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be 75 a4 48 64 02 1c 12 f4 8f bb |0E.!..u.Hd......|
00000010 6a 27 a2 64 2e 9f 62 8d 45 d6 f5 93 23 b3 6c 84 |j'.d..b.E...#.l.|
00000020 46 43 97 6f 50 02 20 3a 01 e7 c5 cc 0f 07 09 5c |FC.oP. :.......\|
00000030 2c 34 5e 3d 32 47 81 ea c6 28 65 29 6b 53 ae 7d |,4^=2G...(e)kS.}|
00000040 25 8a 98 97 29 99 6c |%...).l|
[5e1a 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5e1b 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548d510 gate 1582330554488424600 evaluation starts
[5e1c 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548d510 signed by 0 principal evaluation starts (used [false])
[5e1d 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548d510 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5e1e 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548d510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5e1f 02-22 00:15:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548d510 principal evaluation fails
[5e20 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548d510 gate 1582330554488424600 evaluation fails
[5e21 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5e22 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5e23 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5e24 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 14 4a 1e d5 7d bb 56 e4 ec 01 bf 6b 25 a5 f7 |..J..}.V....k%..|
00000010 2e cb fd b2 32 98 49 af 14 9b 6b 4c a9 23 d6 72 |....2.I...kL.#.r|
[5e25 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be 75 a4 48 64 02 1c 12 f4 8f bb |0E.!..u.Hd......|
00000010 6a 27 a2 64 2e 9f 62 8d 45 d6 f5 93 23 b3 6c 84 |j'.d..b.E...#.l.|
00000020 46 43 97 6f 50 02 20 3a 01 e7 c5 cc 0f 07 09 5c |FC.oP. :.......\|
00000030 2c 34 5e 3d 32 47 81 ea c6 28 65 29 6b 53 ae 7d |,4^=2G...(e)kS.}|
00000040 25 8a 98 97 29 99 6c |%...).l|
[5e26 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5e27 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548de10 gate 1582330554490378300 evaluation starts
[5e28 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548de10 signed by 0 principal evaluation starts (used [false])
[5e29 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548de10 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5e2a 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548de10 principal evaluation succeeds for identity 0
[5e2b 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00548de10 gate 1582330554490378300 evaluation succeeds
[5e2c 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5e2d 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5e2e 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5e2f 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5e30 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[5e31 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes]}
[5e32 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:76
[5e33 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:76
[5e34 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[5e35 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e36 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e37 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e38 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[5e39 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e3a 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e3b 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e3c 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[5e3d 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[5e3e 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[5e3f 02-22 00:15:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e40 02-22 00:15:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151048
[5e41 02-22 00:15:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7228A358BE276AF1ABFA5E5E721037C9AE3845E0B745FDDB4AE91DAAEB803AD7
[5e42 02-22 00:15:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[5e43 02-22 00:15:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[5e44 02-22 00:15:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e45 02-22 00:15:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[5e46 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[5e47 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e48 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[5e49 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[5e4a 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e4b 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[5e4c 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e4d 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[5e4e 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e4f 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[5e50 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e51 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[5e52 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[5e53 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 28 a3 58 be 27 6a f1 ab fa 5e 5e 72 10 37 c9 |r(.X.'j...^^r.7.|
00000010 ae 38 45 e0 b7 45 fd db 4a e9 1d aa eb 80 3a d7 |.8E..E..J.....:.|
[5e54 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 12 cb b7 0b d6 fc 2d 3a 27 42 27 |0D. ?......-:'B'|
00000010 15 6d db 81 93 f2 7b b1 be 35 46 08 ea 66 f3 9a |.m....{..5F..f..|
00000020 78 ba eb a0 02 20 2c 83 3a 57 e0 70 9c ec 73 54 |x.... ,.:W.p..sT|
00000030 e3 9d e7 84 8c 08 09 18 5d 8b ef 3f 3c c3 03 b7 |........]..?<...|
00000040 1f 01 5d e1 08 86 |..]...|
[5e55 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[5e56 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 71 30 c3 61 07 e3 89 0c 20 fa b1 |0D. bq0.a.... ..|
00000010 37 d3 f1 06 58 48 9c 1f fb 8a f9 88 73 5d 10 8a |7...XH......s]..|
00000020 9b 0c e4 c4 02 20 32 ac 22 9b f5 0c 05 37 f6 f4 |..... 2."....7..|
00000030 5e 30 95 47 1b e8 bc 45 2b 78 e1 46 ce 97 eb f9 |^0.G...E+x.F....|
00000040 e5 17 ca a0 26 87 |....&.|
[5e57 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5e58 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[5e59 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e5a 02-22 00:15:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e5b 02-22 00:15:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[5e5c 02-22 00:15:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e5d 02-22 00:15:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[5e5e 02-22 00:15:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[5e5f 02-22 00:15:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 28 a3 58 be 27 6a f1 ab fa 5e 5e 72 10 37 c9 |r(.X.'j...^^r.7.|
00000010 ae 38 45 e0 b7 45 fd db 4a e9 1d aa eb 80 3a d7 |.8E..E..J.....:.|
[5e60 02-22 00:15:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 12 cb b7 0b d6 fc 2d 3a 27 42 27 |0D. ?......-:'B'|
00000010 15 6d db 81 93 f2 7b b1 be 35 46 08 ea 66 f3 9a |.m....{..5F..f..|
00000020 78 ba eb a0 02 20 2c 83 3a 57 e0 70 9c ec 73 54 |x.... ,.:W.p..sT|
00000030 e3 9d e7 84 8c 08 09 18 5d 8b ef 3f 3c c3 03 b7 |........]..?<...|
00000040 1f 01 5d e1 08 86 |..]...|
[5e61 02-22 00:15:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes
[5e62 02-22 00:15:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes
[5e63 02-22 00:15:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e64 02-22 00:15:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[5e65 02-22 00:15:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 a3 3c cc f4 c0 b6 02 6e 74 c8 c0 b8 e3 f9 82 |..<.....nt......|
00000010 41 9c f1 a2 91 87 87 dd 5c 6d e1 2e 82 37 66 4c |A.......\m...7fL|
[5e66 02-22 00:15:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 1a 37 6d cf 5a fb a6 77 49 58 bc |0D. e.7m.Z..wIX.|
00000010 89 69 3c 04 f1 4c e5 04 af 43 b6 73 dc 9f c2 50 |.i<..L...C.s...P|
00000020 bc c9 ed 67 02 20 71 99 b5 55 33 b3 b3 5c e8 bb |...g. q..U3..\..|
00000030 6c b9 3a 5a 67 7f 20 8a 54 ee 99 75 2f 62 2c 4a |l.:Zg. .T..u/b,J|
00000040 91 fe bb 1f d2 b3 |......|
[5e67 02-22 00:15:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes
[5e68 02-22 00:15:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e69 02-22 00:15:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[5e6a 02-22 00:15:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5e6b 02-22 00:15:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5e6c 02-22 00:15:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5e6d 02-22 00:15:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5e6e 02-22 00:15:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5e6f 02-22 00:15:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5e70 02-22 00:15:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5e71 02-22 00:15:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 14 4a 1e d5 7d bb 56 e4 ec 01 bf 6b 25 a5 f7 |..J..}.V....k%..|
00000010 2e cb fd b2 32 98 49 af 14 9b 6b 4c a9 23 d6 72 |....2.I...kL.#.r|
[5e72 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be 75 a4 48 64 02 1c 12 f4 8f bb |0E.!..u.Hd......|
00000010 6a 27 a2 64 2e 9f 62 8d 45 d6 f5 93 23 b3 6c 84 |j'.d..b.E...#.l.|
00000020 46 43 97 6f 50 02 20 3a 01 e7 c5 cc 0f 07 09 5c |FC.oP. :.......\|
00000030 2c 34 5e 3d 32 47 81 ea c6 28 65 29 6b 53 ae 7d |,4^=2G...(e)kS.}|
00000040 25 8a 98 97 29 99 6c |%...).l|
[5e73 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5e74 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054ed280 gate 1582330554590921700 evaluation starts
[5e75 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054ed280 signed by 0 principal evaluation starts (used [false])
[5e76 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054ed280 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5e77 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054ed280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5e78 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054ed280 principal evaluation fails
[5e79 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054ed280 gate 1582330554590921700 evaluation fails
[5e7a 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5e7b 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5e7c 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5e7d 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 14 4a 1e d5 7d bb 56 e4 ec 01 bf 6b 25 a5 f7 |..J..}.V....k%..|
00000010 2e cb fd b2 32 98 49 af 14 9b 6b 4c a9 23 d6 72 |....2.I...kL.#.r|
[5e7e 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be 75 a4 48 64 02 1c 12 f4 8f bb |0E.!..u.Hd......|
00000010 6a 27 a2 64 2e 9f 62 8d 45 d6 f5 93 23 b3 6c 84 |j'.d..b.E...#.l.|
00000020 46 43 97 6f 50 02 20 3a 01 e7 c5 cc 0f 07 09 5c |FC.oP. :.......\|
00000030 2c 34 5e 3d 32 47 81 ea c6 28 65 29 6b 53 ae 7d |,4^=2G...(e)kS.}|
00000040 25 8a 98 97 29 99 6c |%...).l|
[5e7f 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5e80 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054edb80 gate 1582330554592266200 evaluation starts
[5e81 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054edb80 signed by 0 principal evaluation starts (used [false])
[5e82 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054edb80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5e83 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054edb80 principal evaluation succeeds for identity 0
[5e84 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054edb80 gate 1582330554592266200 evaluation succeeds
[5e85 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5e86 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5e87 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5e88 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5e89 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[5e8a 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e8b 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e8c 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[5e8d 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[5e8e 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e8f 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[5e90 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[5e91 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 28 a3 58 be 27 6a f1 ab fa 5e 5e 72 10 37 c9 |r(.X.'j...^^r.7.|
00000010 ae 38 45 e0 b7 45 fd db 4a e9 1d aa eb 80 3a d7 |.8E..E..J.....:.|
[5e92 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 12 cb b7 0b d6 fc 2d 3a 27 42 27 |0D. ?......-:'B'|
00000010 15 6d db 81 93 f2 7b b1 be 35 46 08 ea 66 f3 9a |.m....{..5F..f..|
00000020 78 ba eb a0 02 20 2c 83 3a 57 e0 70 9c ec 73 54 |x.... ,.:W.p..sT|
00000030 e3 9d e7 84 8c 08 09 18 5d 8b ef 3f 3c c3 03 b7 |........]..?<...|
00000040 1f 01 5d e1 08 86 |..]...|
[5e93 02-22 00:15:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes
[5e94 02-22 00:15:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:72 , Envelope: 83 bytes, Signature: 70 bytes
[5e95 02-22 00:15:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e96 02-22 00:15:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[5e97 02-22 00:15:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 a3 3c cc f4 c0 b6 02 6e 74 c8 c0 b8 e3 f9 82 |..<.....nt......|
00000010 41 9c f1 a2 91 87 87 dd 5c 6d e1 2e 82 37 66 4c |A.......\m...7fL|
[5e98 02-22 00:15:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 1a 37 6d cf 5a fb a6 77 49 58 bc |0D. e.7m.Z..wIX.|
00000010 89 69 3c 04 f1 4c e5 04 af 43 b6 73 dc 9f c2 50 |.i<..L...C.s...P|
00000020 bc c9 ed 67 02 20 71 99 b5 55 33 b3 b3 5c e8 bb |...g. q..U3..\..|
00000030 6c b9 3a 5a 67 7f 20 8a 54 ee 99 75 2f 62 2c 4a |l.:Zg. .T..u/b,J|
00000040 91 fe bb 1f d2 b3 |......|
[5e99 02-22 00:15:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes
[5e9a 02-22 00:15:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e9b 02-22 00:15:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e9c 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[5e9d 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5e9e 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[5e9f 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[5ea0 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ea1 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5ea2 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5ea3 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5ea4 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5ea5 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5ea6 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5ea7 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb 5c 19 d5 fd a9 1e be 7c a8 80 89 43 93 3d 19 |.\......|...C.=.|
00000010 7d 92 a3 63 31 3b 91 bb 9a 75 56 68 f0 58 dc ab |}..c1;...uVh.X..|
[5ea8 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 6e 1a 0f 29 2c 52 c7 07 e8 3f 6f |0D. .n..),R...?o|
00000010 12 4a 73 f2 22 72 df 91 1b a7 60 6b e5 4d 1d 11 |.Js."r....`k.M..|
00000020 cc 30 2e 15 02 20 4b f6 4b f8 c2 e9 e9 a4 69 bb |.0... K.K.....i.|
00000030 86 6a 79 d5 cc dd d2 c6 66 03 ba 54 26 b8 95 0d |.jy.....f..T&...|
00000040 4d 17 a7 6b 68 67 |M..khg|
[5ea9 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5eaa 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e50ee0 gate 1582330554657749100 evaluation starts
[5eab 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e50ee0 signed by 0 principal evaluation starts (used [false])
[5eac 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e50ee0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5ead 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e50ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5eae 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e50ee0 principal evaluation fails
[5eaf 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e50ee0 gate 1582330554657749100 evaluation fails
[5eb0 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5eb1 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5eb2 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5eb3 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb 5c 19 d5 fd a9 1e be 7c a8 80 89 43 93 3d 19 |.\......|...C.=.|
00000010 7d 92 a3 63 31 3b 91 bb 9a 75 56 68 f0 58 dc ab |}..c1;...uVh.X..|
[5eb4 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 6e 1a 0f 29 2c 52 c7 07 e8 3f 6f |0D. .n..),R...?o|
00000010 12 4a 73 f2 22 72 df 91 1b a7 60 6b e5 4d 1d 11 |.Js."r....`k.M..|
00000020 cc 30 2e 15 02 20 4b f6 4b f8 c2 e9 e9 a4 69 bb |.0... K.K.....i.|
00000030 86 6a 79 d5 cc dd d2 c6 66 03 ba 54 26 b8 95 0d |.jy.....f..T&...|
00000040 4d 17 a7 6b 68 67 |M..khg|
[5eb5 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5eb6 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e517e0 gate 1582330554658362000 evaluation starts
[5eb7 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e517e0 signed by 0 principal evaluation starts (used [false])
[5eb8 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e517e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5eb9 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e517e0 principal evaluation succeeds for identity 0
[5eba 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e517e0 gate 1582330554658362000 evaluation succeeds
[5ebb 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5ebc 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5ebd 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5ebe 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5ebf 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes
[5ec0 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes]}
[5ec1 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:74
[5ec2 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:74
[5ec3 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:73 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[5ec4 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ec5 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ec6 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ec7 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[5ec8 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ec9 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5eca 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ecb 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[5ecc 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[5ecd 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[5ece 02-22 00:15:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ecf 02-22 00:15:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151049
[5ed0 02-22 00:15:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F8F7406471DD41C907E8D946485A3BFBBC7BEA4C974D1E20316FE0E9E1BC902B
[5ed1 02-22 00:15:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[5ed2 02-22 00:15:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[5ed3 02-22 00:15:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[5ed4 02-22 00:15:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ed5 02-22 00:15:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ed6 02-22 00:15:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[5ed7 02-22 00:15:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ed8 02-22 00:15:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[5ed9 02-22 00:15:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5eda 02-22 00:15:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5edb 02-22 00:15:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5edc 02-22 00:15:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[5edd 02-22 00:15:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[5ede 02-22 00:15:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5edf 02-22 00:15:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[5ee0 02-22 00:15:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ee1 02-22 00:15:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[5ee2 02-22 00:15:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[5ee3 02-22 00:15:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ee4 02-22 00:15:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[5ee5 02-22 00:15:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[5ee6 02-22 00:15:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 f7 40 64 71 dd 41 c9 07 e8 d9 46 48 5a 3b fb |..@dq.A....FHZ;.|
00000010 bc 7b ea 4c 97 4d 1e 20 31 6f e0 e9 e1 bc 90 2b |.{.L.M. 1o.....+|
[5ee7 02-22 00:15:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 4e 02 77 b3 dc 45 81 67 49 61 e9 |0D. BN.w..E.gIa.|
00000010 02 95 1a a8 ce 7e 06 d3 d6 73 fd db 22 52 b7 3f |.....~...s.."R.?|
00000020 f9 b2 4b d4 02 20 6c dc bc ff 14 0a f4 b5 2d ab |..K.. l.......-.|
00000030 0a 36 b9 9d dc 30 5f a6 5f cb 5c 4f d8 f0 e3 ea |.6...0_._.\O....|
00000040 63 ab 57 da ed fa |c.W...|
[5ee8 02-22 00:15:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:73 , Envelope: 83 bytes, Signature: 70 bytes
[5ee9 02-22 00:15:54.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5eea 02-22 00:15:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5eeb 02-22 00:15:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5eec 02-22 00:15:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[5eed 02-22 00:15:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[5eee 02-22 00:15:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[5eef 02-22 00:15:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ef0 02-22 00:15:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ef1 02-22 00:15:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[5ef2 02-22 00:15:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5ef3 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[5ef4 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ef5 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ef6 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5ef7 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5ef8 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5ef9 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5efa 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5efb 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5efc 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5efd 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5efe 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5eff 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[5f00 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5f01 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a3e70 gate 1582330555013208200 evaluation starts
[5f02 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a3e70 signed by 0 principal evaluation starts (used [false])
[5f03 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a3e70 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5f04 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a3e70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5f05 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a3e70 principal evaluation fails
[5f06 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a3e70 gate 1582330555013208200 evaluation fails
[5f07 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5f08 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5f09 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5f0a 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5f0b 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5f0c 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5f0d 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7c770 gate 1582330555016079300 evaluation starts
[5f0e 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7c770 signed by 0 principal evaluation starts (used [false])
[5f0f 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7c770 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5f10 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7c770 principal evaluation succeeds for identity 0
[5f11 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7c770 gate 1582330555016079300 evaluation succeeds
[5f12 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5f13 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5f14 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5f15 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5f16 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[5f17 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[5f18 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[5f19 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[5f1a 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f1b 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f1c 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5f1d 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5f1e 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5f1f 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5f20 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5f21 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5f22 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5f23 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5f24 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5f25 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b390a0 gate 1582330555019017600 evaluation starts
[5f26 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b390a0 signed by 0 principal evaluation starts (used [false])
[5f27 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b390a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5f28 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b390a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5f29 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b390a0 principal evaluation fails
[5f2a 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b390a0 gate 1582330555019017600 evaluation fails
[5f2b 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5f2c 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5f2d 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5f2e 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5f2f 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5f30 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5f31 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b399b0 gate 1582330555019880100 evaluation starts
[5f32 02-22 00:15:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b399b0 signed by 0 principal evaluation starts (used [false])
[5f33 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b399b0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5f34 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b399b0 principal evaluation succeeds for identity 0
[5f35 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b399b0 gate 1582330555019880100 evaluation succeeds
[5f36 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5f37 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5f38 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5f39 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5f3a 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f3b 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[5f3c 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[5f3d 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[5f3e 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[5f3f 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[5f40 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f41 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f42 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5f43 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5f44 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5f45 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5f46 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5f47 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5f48 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5f49 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5f4a 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5f4b 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af4440 gate 1582330555022076800 evaluation starts
[5f4c 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af4440 signed by 0 principal evaluation starts (used [false])
[5f4d 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af4440 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5f4e 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af4440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5f4f 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af4440 principal evaluation fails
[5f50 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af4440 gate 1582330555022076800 evaluation fails
[5f51 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5f52 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5f53 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5f54 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5f55 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5f56 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5f57 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af4d60 gate 1582330555022533700 evaluation starts
[5f58 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af4d60 signed by 0 principal evaluation starts (used [false])
[5f59 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af4d60 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5f5a 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af4d60 principal evaluation succeeds for identity 0
[5f5b 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af4d60 gate 1582330555022533700 evaluation succeeds
[5f5c 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5f5d 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5f5e 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5f5f 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5f60 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f61 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f62 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5f63 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5f64 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5f65 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5f66 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5f67 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5f68 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5f69 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5f6a 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5f6b 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a827c0 gate 1582330555023487700 evaluation starts
[5f6c 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a827c0 signed by 0 principal evaluation starts (used [false])
[5f6d 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a827c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5f6e 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a827c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5f6f 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a827c0 principal evaluation fails
[5f70 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a827c0 gate 1582330555023487700 evaluation fails
[5f71 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5f72 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5f73 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5f74 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5f75 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5f76 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5f77 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a83130 gate 1582330555026143400 evaluation starts
[5f78 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a83130 signed by 0 principal evaluation starts (used [false])
[5f79 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a83130 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5f7a 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a83130 principal evaluation succeeds for identity 0
[5f7b 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a83130 gate 1582330555026143400 evaluation succeeds
[5f7c 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5f7d 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5f7e 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5f7f 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5f80 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5f81 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[5f82 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f83 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f84 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5f85 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5f86 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5f87 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5f88 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5f89 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5f8a 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5f8b 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5f8c 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5f8d 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5f8e 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4cfb0 gate 1582330555027107100 evaluation starts
[5f8f 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4cfb0 signed by 0 principal evaluation starts (used [false])
[5f90 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4cfb0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5f91 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4cfb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5f92 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4cfb0 principal evaluation fails
[5f93 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4cfb0 gate 1582330555027107100 evaluation fails
[5f94 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5f95 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5f96 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5f97 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[5f98 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[5f99 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5f9a 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4d8d0 gate 1582330555027520700 evaluation starts
[5f9b 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4d8d0 signed by 0 principal evaluation starts (used [false])
[5f9c 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4d8d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[5f9d 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4d8d0 principal evaluation succeeds for identity 0
[5f9e 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4d8d0 gate 1582330555027520700 evaluation succeeds
[5f9f 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5fa0 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5fa1 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5fa2 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5fa3 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[5fa4 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[5fa5 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fa6 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fa7 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[5fa8 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[5fa9 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[5faa 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[5fab 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[5fac 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[5fad 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5fae 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5faf 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5fb0 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e79f0 gate 1582330555028700400 evaluation starts
[5fb1 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e79f0 signed by 0 principal evaluation starts (used [false])
[5fb2 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e79f0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5fb3 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e79f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[5fb4 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e79f0 principal evaluation fails
[5fb5 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e79f0 gate 1582330555028700400 evaluation fails
[5fb6 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[5fb7 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[5fb8 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[5fb9 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[5fba 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[5fbb 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[5fbc 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039be2f0 gate 1582330555029103300 evaluation starts
[5fbd 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039be2f0 signed by 0 principal evaluation starts (used [false])
[5fbe 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039be2f0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[5fbf 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039be2f0 principal evaluation succeeds for identity 0
[5fc0 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039be2f0 gate 1582330555029103300 evaluation succeeds
[5fc1 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[5fc2 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[5fc3 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[5fc4 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[5fc5 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[5fc6 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[5fc7 02-22 00:15:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5fc8 02-22 00:15:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fc9 02-22 00:15:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fca 02-22 00:15:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[5fcb 02-22 00:15:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fcc 02-22 00:15:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fcd 02-22 00:15:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9157480929809226872 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[5fce 02-22 00:15:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9157480929809226872 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[5fcf 02-22 00:15:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5fd0 02-22 00:15:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9157480929809226872 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[5fd1 02-22 00:15:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9157480929809226872 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes
[5fd2 02-22 00:15:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5fd3 02-22 00:15:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[5fd4 02-22 00:15:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fd5 02-22 00:15:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fd6 02-22 00:15:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5fd7 02-22 00:15:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:528563360520909794 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[5fd8 02-22 00:15:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:528563360520909794 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[5fd9 02-22 00:15:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[5fda 02-22 00:15:55.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5fdb 02-22 00:15:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[5fdc 02-22 00:15:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fdd 02-22 00:15:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fde 02-22 00:15:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fdf 02-22 00:15:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5fe0 02-22 00:15:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[5fe1 02-22 00:15:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[5fe2 02-22 00:15:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fe3 02-22 00:15:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fe4 02-22 00:15:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[5fe5 02-22 00:15:56.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[5fe6 02-22 00:15:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:44904
[5fe7 02-22 00:15:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel= txID=59154b80 mspID=Org1MSP
[5fe8 02-22 00:15:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 93 82 27 4f 61 58 42 e3 ea 71 2e 68 f1 96 80 |...'OaXB..q.h...|
00000010 57 35 28 02 ff 17 6b a5 c8 df 96 cc 91 27 87 03 |W5(...k......'..|
[5fe9 02-22 00:15:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 9c 8e 1d 43 a5 cc 27 28 11 8d |0E.!.....C..'(..|
00000010 c5 93 33 3e bc 4e c9 ce a4 c6 f6 c4 3a 27 bc f9 |..3>.N......:'..|
00000020 e1 8f c2 79 e0 02 20 37 16 44 50 e1 0d e7 75 b8 |...y.. 7.DP...u.|
00000030 56 0b b2 d4 83 0a 92 df 3a 70 d8 cc dc 92 3c 90 |V.......:p....<.|
00000040 2c c7 fe e5 58 37 d4 |,...X7.|
[5fea 02-22 00:15:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel= txID=59154b80 mspID=Org1MSP
[5feb 02-22 00:15:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU [59154b80] getting chaincode data for _lifecycle on channel
[5fec 02-22 00:15:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[5fed 02-22 00:15:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 93 82 27 4f 61 58 42 e3 ea 71 2e 68 f1 96 80 |...'OaXB..q.h...|
00000010 57 35 28 02 ff 17 6b a5 c8 df 96 cc 91 27 87 03 |W5(...k......'..|
[5fee 02-22 00:15:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 9c 8e 1d 43 a5 cc 27 28 11 8d |0E.!.....C..'(..|
00000010 c5 93 33 3e bc 4e c9 ce a4 c6 f6 c4 3a 27 bc f9 |..3>.N......:'..|
00000020 e1 8f c2 79 e0 02 20 37 16 44 50 e1 0d e7 75 b8 |...y.. 7.DP...u.|
00000030 56 0b b2 d4 83 0a 92 df 3a 70 d8 cc dc 92 3c 90 |V.......:p....<.|
00000040 2c c7 fe e5 58 37 d4 |,...X7.|
[5fef 02-22 00:15:57.10 UTC] [%{longpkg}] %{callpath} -> DEBU received invocation of QueryInstalledChaincodes
[5ff0 02-22 00:15:57.10 UTC] [%{longpkg}] %{callpath} -> DEBU [59154b80] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[5ff1 02-22 00:15:57.10 UTC] [%{longpkg}] %{callpath} -> DEBU [59154b80] notifying Txid:59154b809074f9c379e9aceec1e47df2f4acfe7c6afa90814d0a11b31ebc6dc2, channelID:
[5ff2 02-22 00:15:57.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[5ff3 02-22 00:15:57.10 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: _lifecycle duration: 12ms channel= txID=59154b80
[5ff4 02-22 00:15:57.10 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44904 grpc.code=OK grpc.call_duration=13.081ms
[5ff5 02-22 00:15:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[5ff6 02-22 00:15:57.12 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[5ff7 02-22 00:15:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:44912
[5ff8 02-22 00:15:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel= txID=f65ef687 mspID=Org1MSP
[5ff9 02-22 00:15:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 58 87 ad 11 a3 c4 cb 57 04 21 60 18 d8 fa c2 |uX......W.!`....|
00000010 19 7d 3d 51 de 66 4a 94 5c d3 cc db 73 13 18 e7 |.}=Q.fJ.\...s...|
[5ffa 02-22 00:15:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 56 3b d8 f1 65 98 71 73 c5 ce f2 |0D. fV;..e.qs...|
00000010 db f6 51 8d fb 5c 23 a1 d6 82 d9 8a 2a ca 31 b7 |..Q..\#.....*.1.|
00000020 7e f7 d9 a4 02 20 71 c8 5b f2 b1 cc ea 7b d4 2b |~.... q.[....{.+|
00000030 f6 01 30 12 7f 00 0d dc eb 00 8b c8 44 24 f5 7a |..0.........D$.z|
00000040 06 c5 68 51 28 e4 |..hQ(.|
[5ffb 02-22 00:15:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel= txID=f65ef687 mspID=Org1MSP
[5ffc 02-22 00:15:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU [f65ef687] getting chaincode data for _lifecycle on channel
[5ffd 02-22 00:15:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[5ffe 02-22 00:15:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 58 87 ad 11 a3 c4 cb 57 04 21 60 18 d8 fa c2 |uX......W.!`....|
00000010 19 7d 3d 51 de 66 4a 94 5c d3 cc db 73 13 18 e7 |.}=Q.fJ.\...s...|
[5fff 02-22 00:15:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 56 3b d8 f1 65 98 71 73 c5 ce f2 |0D. fV;..e.qs...|
00000010 db f6 51 8d fb 5c 23 a1 d6 82 d9 8a 2a ca 31 b7 |..Q..\#.....*.1.|
00000020 7e f7 d9 a4 02 20 71 c8 5b f2 b1 cc ea 7b d4 2b |~.... q.[....{.+|
00000030 f6 01 30 12 7f 00 0d dc eb 00 8b c8 44 24 f5 7a |..0.........D$.z|
00000040 06 c5 68 51 28 e4 |..hQ(.|
[6000 02-22 00:15:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU received invocation of QueryInstalledChaincodes
[6001 02-22 00:15:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU [f65ef687] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[6002 02-22 00:15:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU [f65ef687] notifying Txid:f65ef687f477b44fba78ecf2715a9ee98d4ff097a94dcb7147e799c91d839836, channelID:
[6003 02-22 00:15:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[6004 02-22 00:15:57.73 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: _lifecycle duration: 3ms channel= txID=f65ef687
[6005 02-22 00:15:57.73 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44912 grpc.code=OK grpc.call_duration=9.2933ms
[6006 02-22 00:15:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6007 02-22 00:15:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:44912: read: connection reset by peer
[6008 02-22 00:15:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6009 02-22 00:15:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:44916
[600a 02-22 00:15:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[600b 02-22 00:15:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[600c 02-22 00:15:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:1844579928786194390 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[600d 02-22 00:15:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1844579928786194390 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[600e 02-22 00:15:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[600f 02-22 00:15:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6010 02-22 00:15:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6011 02-22 00:15:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6012 02-22 00:15:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6013 02-22 00:15:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6014 02-22 00:15:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[6015 02-22 00:15:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6016 02-22 00:15:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[6017 02-22 00:15:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[6018 02-22 00:15:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel=businesschannel txID=b42a3228 mspID=Org1MSP
[6019 02-22 00:15:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 42 0c 4a 82 0d 6f 0f 49 29 ce b7 47 66 99 ab |jB.J..o.I)..Gf..|
00000010 11 d8 06 e5 f3 2d 29 fd a6 4a 96 6d 89 cf 1e d1 |.....-)..J.m....|
[601a 02-22 00:15:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 b0 b5 d8 96 c6 80 93 bf 67 91 |0E.!..........g.|
00000010 cf a6 4f fd ea ad 6e 12 57 cd 92 95 ce 15 50 9e |..O...n.W.....P.|
00000020 15 0c 28 0f 76 02 20 18 bc 5e b9 de e1 35 c7 b4 |..(.v. ..^...5..|
00000030 5b c6 80 d5 2e 3e d9 fd b1 44 62 4a 23 a7 6a e7 |[....>...DbJ#.j.|
00000040 b4 25 fb 52 30 37 c2 |.%.R07.|
[601b 02-22 00:15:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel=businesschannel txID=b42a3228 mspID=Org1MSP
[601c 02-22 00:15:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774]
[601d 02-22 00:15:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x62, 0x34, 0x32, 0x61, 0x33, 0x32, 0x32, 0x38, 0x64, 0x37, 0x62, 0x64, 0x61, 0x63, 0x63, 0x39, 0x34, 0x33, 0x62, 0x31, 0x65, 0x39, 0x66, 0x33, 0x33, 0x32, 0x38, 0x36, 0x35, 0x38, 0x32, 0x37, 0x38, 0x64, 0x63, 0x37, 0x32, 0x66, 0x62, 0x36, 0x64, 0x38, 0x66, 0x62, 0x38, 0x63, 0x34, 0x65, 0x64, 0x62, 0x39, 0x31, 0x66, 0x65, 0x30, 0x37, 0x65, 0x66, 0x62, 0x30, 0x30, 0x37, 0x37, 0x34}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x62, 0x34, 0x32, 0x61, 0x33, 0x32, 0x32, 0x38, 0x64, 0x37, 0x62, 0x64, 0x61, 0x63, 0x63, 0x39, 0x34, 0x33, 0x62, 0x31, 0x65, 0x39, 0x66, 0x33, 0x33, 0x32, 0x38, 0x36, 0x35, 0x38, 0x32, 0x37, 0x38, 0x64, 0x63, 0x37, 0x32, 0x66, 0x62, 0x36, 0x64, 0x38, 0x66, 0x62, 0x38, 0x63, 0x34, 0x65, 0x64, 0x62, 0x39, 0x31, 0x66, 0x65, 0x30, 0x37, 0x65, 0x66, 0x62, 0x30, 0x30, 0x37, 0x37, 0x34, 0xff}]
[601e 02-22 00:15:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[601f 02-22 00:15:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774]
[6020 02-22 00:15:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] getting chaincode data for _lifecycle on channel businesschannel
[6021 02-22 00:15:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[6022 02-22 00:15:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 42 0c 4a 82 0d 6f 0f 49 29 ce b7 47 66 99 ab |jB.J..o.I)..Gf..|
00000010 11 d8 06 e5 f3 2d 29 fd a6 4a 96 6d 89 cf 1e d1 |.....-)..J.m....|
[6023 02-22 00:15:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 b0 b5 d8 96 c6 80 93 bf 67 91 |0E.!..........g.|
00000010 cf a6 4f fd ea ad 6e 12 57 cd 92 95 ce 15 50 9e |..O...n.W.....P.|
00000020 15 0c 28 0f 76 02 20 18 bc 5e b9 de e1 35 c7 b4 |..(.v. ..^...5..|
00000030 5b c6 80 d5 2e 3e d9 fd b1 44 62 4a 23 a7 6a e7 |[....>...DbJ#.j.|
00000040 b4 25 fb 52 30 37 c2 |.%.R07.|
[6024 02-22 00:15:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[6025 02-22 00:15:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[6026 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6027 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[6028 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[6029 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 a1 35 02 0d ad fe c8 bf 70 fb 19 ff 1a f2 d4 |..5......p......|
00000010 1d 70 96 7d 91 77 8b 94 65 96 be 3f 50 f9 a9 9e |.p.}.w..e..?P...|
[602a 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 10 50 db f0 93 5d 19 27 97 19 c9 |0D. ..P...].'...|
00000010 34 ab 92 77 ae 58 79 05 8d 64 a6 3e 1b 1f 48 06 |4..w.Xy..d.>..H.|
00000020 63 89 af eb 02 20 71 3a 5a 58 d3 63 19 48 1d 12 |c.... q:ZX.c.H..|
00000030 c5 86 ba c0 d0 25 ba 44 8b 87 ed 17 30 b3 60 59 |.....%.D....0.`Y|
00000040 74 7c d6 55 20 85 |t|.U .|
[602b 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[602c 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 9f b6 a2 a0 4c b4 06 c7 0e 98 a6 |0D. z....L......|
00000010 93 a6 12 b1 17 4e d0 44 7a 30 86 88 57 0a 63 b2 |.....N.Dz0..W.c.|
00000020 39 4c 33 a5 02 20 2a 40 55 57 dc 74 df 86 e2 f9 |9L3.. *@UW.t....|
00000030 33 f8 7c c6 57 4c 67 10 a9 a6 e6 e2 58 1d 3e bb |3.|.WLg.....X.>.|
00000040 ac 6c 63 95 cf 7a |.lc..z|
[602d 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[602e 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[602f 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:78
[6030 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:78
[6031 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[6032 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6033 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6034 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6035 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[6036 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6037 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6038 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[6039 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[603a 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[603b 02-22 00:15:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[603c 02-22 00:15:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02
[603d 02-22 00:15:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:314079537601738479 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[603e 02-22 00:15:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:314079537601738479 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[603f 02-22 00:15:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:314079537601738479 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6040 02-22 00:15:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6041 02-22 00:15:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6042 02-22 00:15:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6043 02-22 00:15:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6044 02-22 00:15:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6045 02-22 00:15:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6046 02-22 00:15:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[6047 02-22 00:15:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6048 02-22 00:15:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:7586242304716163206 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6049 02-22 00:15:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:7586242304716163206 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[604a 02-22 00:15:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[604b 02-22 00:15:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[604c 02-22 00:15:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU received invocation of ApproveChaincodeDefinitionForMyOrg on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: ()'
[604d 02-22 00:15:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[604e 02-22 00:15:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] handling GET_STATE from chaincode
[604f 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[6050 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:6168842397059925127 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[6051 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[6052 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:4216108283172154727 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[6053 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[6054 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:16489880771190575764 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[6055 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:16489880771190575764 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6056 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6057 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:6168842397059925127 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6058 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6059 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:4216108283172154727 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[605a 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[605b 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6168842397059925127 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[605c 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6168842397059925127 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[605d 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[605e 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4216108283172154727 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[605f 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4216108283172154727 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[6060 02-22 00:15:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6061 02-22 00:15:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16489880771190575764 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[6062 02-22 00:15:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16489880771190575764 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[6063 02-22 00:15:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16489880771190575764 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[6064 02-22 00:15:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6065 02-22 00:15:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel
[6066 02-22 00:15:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[6067 02-22 00:15:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload
[6068 02-22 00:15:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Completed GET_STATE. Sending RESPONSE
[6069 02-22 00:15:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[606a 02-22 00:15:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] handling GET_STATE from chaincode
[606b 02-22 00:15:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] getting state for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel
[606c 02-22 00:15:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[606d 02-22 00:15:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[606e 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > maximum_peer_count:1 > > ]
[606f 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=namespaces/metadata/exp02#1
[6070 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[6071 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] No state associated with key: namespaces/metadata/exp02#1. Sending RESPONSE with an empty payload
[6072 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Completed GET_STATE. Sending RESPONSE
[6073 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[6074 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] handling GET_STATE from chaincode
[6075 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] getting state for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel
[6076 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=namespaces/metadata/exp02#1
[6077 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[6078 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] No state associated with key: namespaces/metadata/exp02#1. Sending RESPONSE with an empty payload
[6079 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Completed GET_STATE. Sending RESPONSE
[607a 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[607b 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] handling PUT_STATE from chaincode
[607c 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Completed PUT_STATE. Sending RESPONSE
[607d 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[607e 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] handling PUT_STATE from chaincode
[607f 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Completed PUT_STATE. Sending RESPONSE
[6080 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[6081 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] handling PUT_STATE from chaincode
[6082 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Completed PUT_STATE. Sending RESPONSE
[6083 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[6084 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] handling PUT_STATE from chaincode
[6085 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Completed PUT_STATE. Sending RESPONSE
[6086 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[6087 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] handling GET_STATE from chaincode
[6088 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] getting state for chaincode _lifecycle, key chaincode-sources/metadata/exp02#1, channel businesschannel
[6089 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=chaincode-sources/metadata/exp02#1
[608a 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'
[608b 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] No state associated with key: chaincode-sources/metadata/exp02#1. Sending RESPONSE with an empty payload
[608c 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Completed GET_STATE. Sending RESPONSE
[608d 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[608e 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] handling PUT_STATE from chaincode
[608f 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Completed PUT_STATE. Sending RESPONSE
[6090 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[6091 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] handling PUT_STATE from chaincode
[6092 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Completed PUT_STATE. Sending RESPONSE
[6093 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> INFO Successfully endorsed chaincode approval with name 'exp02', package ID 'exp02:4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8', on channel 'businesschannel' with definition {sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: ()}
[6094 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[6095 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [b42a3228] notifying Txid:b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774, channelID:businesschannel
[6096 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[6097 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: _lifecycle duration: 171ms channel=businesschannel txID=b42a3228
[6098 02-22 00:15:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[6099 02-22 00:15:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774]
[609a 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:77 , Envelope: 83 bytes, Signature: 69 bytes , Envelope: 164 bytes, Signature: 0 bytes
[609b 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:77 , Envelope: 83 bytes, Signature: 69 bytes , Envelope: 164 bytes, Signature: 0 bytes
[609c 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[609d 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:77 , Envelope: 83 bytes, Signature: 69 bytes , Envelope: 164 bytes, Signature: 0 bytes
[609e 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[609f 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[60a0 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[60a1 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[60a2 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[60a3 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[60a4 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[60a5 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[60a6 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 86 1d fb ba 2c 03 29 de 56 90 d5 6c c0 a0 78 |.....,.).V..l..x|
00000010 75 42 84 e2 7f 2d ae 17 17 72 6c aa 8a 81 61 0a |uB...-...rl...a.|
[60a7 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 41 28 48 15 6c 22 06 58 21 2c cd 91 |0C. A(H.l".X!,..|
00000010 7f 1e 69 a3 e7 bc 41 77 32 a3 d0 52 d6 01 25 8f |..i...Aw2..R..%.|
00000020 b3 e8 11 25 02 1f 36 f1 9d e3 2b 67 3d 86 67 df |...%..6...+g=.g.|
00000030 0f 9e f3 59 5e f0 48 4c d1 7e 83 a4 5b bd b7 7d |...Y^.HL.~..[..}|
00000040 80 c6 ab fc 85 |.....|
[60a8 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[60a9 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729400 gate 1582330558450936600 evaluation starts
[60aa 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729400 signed by 0 principal evaluation starts (used [false])
[60ab 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729400 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[60ac 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[60ad 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729400 principal evaluation fails
[60ae 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729400 gate 1582330558450936600 evaluation fails
[60af 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[60b0 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[60b1 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[60b2 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 86 1d fb ba 2c 03 29 de 56 90 d5 6c c0 a0 78 |.....,.).V..l..x|
00000010 75 42 84 e2 7f 2d ae 17 17 72 6c aa 8a 81 61 0a |uB...-...rl...a.|
[60b3 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 41 28 48 15 6c 22 06 58 21 2c cd 91 |0C. A(H.l".X!,..|
00000010 7f 1e 69 a3 e7 bc 41 77 32 a3 d0 52 d6 01 25 8f |..i...Aw2..R..%.|
00000020 b3 e8 11 25 02 1f 36 f1 9d e3 2b 67 3d 86 67 df |...%..6...+g=.g.|
00000030 0f 9e f3 59 5e f0 48 4c d1 7e 83 a4 5b bd b7 7d |...Y^.HL.~..[..}|
00000040 80 c6 ab fc 85 |.....|
[60b4 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[60b5 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729d00 gate 1582330558455580300 evaluation starts
[60b6 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729d00 signed by 0 principal evaluation starts (used [false])
[60b7 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729d00 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[60b8 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729d00 principal evaluation succeeds for identity 0
[60b9 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729d00 gate 1582330558455580300 evaluation succeeds
[60ba 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[60bb 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[60bc 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[60bd 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[60be 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:77 , Envelope: 83 bytes, Signature: 69 bytes
[60bf 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:77 , Envelope: 83 bytes, Signature: 69 bytes]}
[60c0 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:77
[60c1 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:77
[60c2 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[60c3 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60c4 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60c5 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60c6 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[60c7 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[60c8 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[60c9 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[60ca 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes to 1 peers
[60cb 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[60cc 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes
[60cd 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60ce 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[60cf 02-22 00:15:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Computing dissemination plan for collection [_implicit_org_Org1MSP]
[60d0 02-22 00:15:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[60d1 02-22 00:15:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[60d2 02-22 00:15:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[60d3 02-22 00:15:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036400c0 gate 1582330558469020000 evaluation starts
[60d4 02-22 00:15:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036400c0 signed by 0 principal evaluation starts (used [false])
[60d5 02-22 00:15:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036400c0 processing identity 0 - &{Org1MSP 8be655ba89451b517544b2a241617d188129889401e79f0659d7ccb414b44486}
[60d6 02-22 00:15:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036400c0 principal evaluation succeeds for identity 0
[60d7 02-22 00:15:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036400c0 gate 1582330558469020000 evaluation succeeds
[60d8 02-22 00:15:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[60d9 02-22 00:15:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[60da 02-22 00:15:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[60db 02-22 00:15:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036406d0 gate 1582330558469501400 evaluation starts
[60dc 02-22 00:15:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036406d0 signed by 0 principal evaluation starts (used [false])
[60dd 02-22 00:15:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036406d0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[60de 02-22 00:15:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036406d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[60df 02-22 00:15:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036406d0 principal evaluation fails
[60e0 02-22 00:15:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036406d0 gate 1582330558469501400 evaluation fails
[60e1 02-22 00:15:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[60e2 02-22 00:15:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[60e3 02-22 00:15:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[60e4 02-22 00:15:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003640d90 gate 1582330558478152600 evaluation starts
[60e5 02-22 00:15:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003640d90 signed by 0 principal evaluation starts (used [false])
[60e6 02-22 00:15:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003640d90 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[60e7 02-22 00:15:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003640d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[60e8 02-22 00:15:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003640d90 principal evaluation fails
[60e9 02-22 00:15:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003640d90 gate 1582330558478152600 evaluation fails
[60ea 02-22 00:15:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU MaximumPeerCount satisfied
[60eb 02-22 00:15:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Disseminating private RWSet for TxID [b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774] namespace [_lifecycle] collection [_implicit_org_Org1MSP] to peers: [peer1.org1.example.com:7051]
[60ec 02-22 00:15:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:17748842171416266317 channel:"businesschannel" tag:CHAN_ONLY private_data:<payload:<collection_name:"_implicit_org_Org1MSP" namespace:"_lifecycle" tx_id:"b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774" private_rwset:"\032v\n*chaincode-sources/fields/exp02#1/PackageID\032H\032Fexp02:4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8\032H\n\"chaincode-sources/metadata/exp02#1\032\"\n\025ChaincodeLocalPackage\022\tPackageID\032+\n%namespaces/fields/exp02#1/Collections\032\002\022\000\032<\n)namespaces/fields/exp02#1/EndorsementInfo\032\017\022\r\n\0031.0\020\001\032\004escc\032`\n(namespaces/fields/exp02#1/ValidationInfo\0324\0222\n\004vscc\022*\n(\022\014\022\n\010\001\022\002\010\000\022\002\010\001\032\013\022\t\n\007Org1MSP\032\013\022\t\n\007Org2MSP\032b\n\033namespaces/metadata/exp02#1\032C\n\023ChaincodeParameters\022\017EndorsementInfo\022\016ValidationInfo\022\013Collections" private_sim_height:3 collection_configs:<config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > > > > , Envelope: 700 bytes, Signature: 0 bytes to 1 peers
[60ed 02-22 00:15:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: nonce:17748842171416266317 channel:"businesschannel" tag:CHAN_ONLY private_data:<payload:<collection_name:"_implicit_org_Org1MSP" namespace:"_lifecycle" tx_id:"b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774" private_rwset:"\032v\n*chaincode-sources/fields/exp02#1/PackageID\032H\032Fexp02:4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8\032H\n\"chaincode-sources/metadata/exp02#1\032\"\n\025ChaincodeLocalPackage\022\tPackageID\032+\n%namespaces/fields/exp02#1/Collections\032\002\022\000\032<\n)namespaces/fields/exp02#1/EndorsementInfo\032\017\022\r\n\0031.0\020\001\032\004escc\032`\n(namespaces/fields/exp02#1/ValidationInfo\0324\0222\n\004vscc\022*\n(\022\014\022\n\010\001\022\002\010\000\022\002\010\001\032\013\022\t\n\007Org1MSP\032\013\022\t\n\007Org2MSP\032b\n\033namespaces/metadata/exp02#1\032C\n\023ChaincodeParameters\022\017EndorsementInfo\022\016ValidationInfo\022\013Collections" private_sim_height:3 collection_configs:<config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > > > > , Envelope: 700 bytes, Signature: 0 bytes
[60ee 02-22 00:15:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60ef 02-22 00:15:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15104A
[60f0 02-22 00:15:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 34B6769501540813509E7D75BB580A7F81CC73BB0CA1B50482117F0A88180606
[60f1 02-22 00:15:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[60f2 02-22 00:15:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[60f3 02-22 00:15:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[60f4 02-22 00:15:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[60f5 02-22 00:15:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[60f6 02-22 00:15:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60f7 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[60f8 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[60f9 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[60fa 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[60fb 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[60fc 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60fd 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[60fe 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[60ff 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6100 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[6101 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[6102 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 34 b6 76 95 01 54 08 13 50 9e 7d 75 bb 58 0a 7f |4.v..T..P.}u.X..|
00000010 81 cc 73 bb 0c a1 b5 04 82 11 7f 0a 88 18 06 06 |..s.............|
[6103 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 71 56 34 5e 91 ed 0f bb cd b9 3a |0D. .qV4^......:|
00000010 57 62 1a 3a ff af 55 9a e4 fc 89 f9 63 ad 24 85 |Wb.:..U.....c.$.|
00000020 d7 0f e2 9c 02 20 43 cd a6 74 c3 68 f3 e3 0b ce |..... C..t.h....|
00000030 9d 2a dd ac 37 21 e6 f5 59 b9 e3 87 4a 27 0a d0 |.*..7!..Y...J'..|
00000040 63 09 4e af f7 e7 |c.N...|
[6104 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[6105 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 b1 51 16 bb b5 63 25 83 90 6b 41 |0D. ".Q...c%..kA|
00000010 6f 4d 4b 26 d6 e4 be bb 0b bc ce 93 1a 41 27 9b |oMK&.........A'.|
00000020 9b b1 e4 1d 02 20 72 4c 7d 76 d9 1d 05 03 d7 d0 |..... rL}v......|
00000030 4f 25 e6 d4 9b 3a 1b 93 ab 59 96 b9 2a a6 56 a8 |O%...:...Y..*.V.|
00000040 b5 a7 37 9c f1 6d |..7..m|
[6106 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6107 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6108 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6109 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[610a 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[610b 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[610c 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[610d 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[610e 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[610f 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6110 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6111 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6112 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6113 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6114 02-22 00:15:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6115 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 86 1d fb ba 2c 03 29 de 56 90 d5 6c c0 a0 78 |.....,.).V..l..x|
00000010 75 42 84 e2 7f 2d ae 17 17 72 6c aa 8a 81 61 0a |uB...-...rl...a.|
[6116 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 41 28 48 15 6c 22 06 58 21 2c cd 91 |0C. A(H.l".X!,..|
00000010 7f 1e 69 a3 e7 bc 41 77 32 a3 d0 52 d6 01 25 8f |..i...Aw2..R..%.|
00000020 b3 e8 11 25 02 1f 36 f1 9d e3 2b 67 3d 86 67 df |...%..6...+g=.g.|
00000030 0f 9e f3 59 5e f0 48 4c d1 7e 83 a4 5b bd b7 7d |...Y^.HL.~..[..}|
00000040 80 c6 ab fc 85 |.....|
[6117 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6118 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035408a0 gate 1582330558550218900 evaluation starts
[6119 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035408a0 signed by 0 principal evaluation starts (used [false])
[611a 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035408a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[611b 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035408a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[611c 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035408a0 principal evaluation fails
[611d 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035408a0 gate 1582330558550218900 evaluation fails
[611e 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[611f 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6120 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6121 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 86 1d fb ba 2c 03 29 de 56 90 d5 6c c0 a0 78 |.....,.).V..l..x|
00000010 75 42 84 e2 7f 2d ae 17 17 72 6c aa 8a 81 61 0a |uB...-...rl...a.|
[6122 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 41 28 48 15 6c 22 06 58 21 2c cd 91 |0C. A(H.l".X!,..|
00000010 7f 1e 69 a3 e7 bc 41 77 32 a3 d0 52 d6 01 25 8f |..i...Aw2..R..%.|
00000020 b3 e8 11 25 02 1f 36 f1 9d e3 2b 67 3d 86 67 df |...%..6...+g=.g.|
00000030 0f 9e f3 59 5e f0 48 4c d1 7e 83 a4 5b bd b7 7d |...Y^.HL.~..[..}|
00000040 80 c6 ab fc 85 |.....|
[6123 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6124 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035411b0 gate 1582330558550706000 evaluation starts
[6125 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035411b0 signed by 0 principal evaluation starts (used [false])
[6126 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035411b0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6127 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035411b0 principal evaluation succeeds for identity 0
[6128 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035411b0 gate 1582330558550706000 evaluation succeeds
[6129 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[612a 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[612b 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[612c 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[612d 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:77 , Envelope: 83 bytes, Signature: 69 bytes
[612e 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[612f 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[6130 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 34 b6 76 95 01 54 08 13 50 9e 7d 75 bb 58 0a 7f |4.v..T..P.}u.X..|
00000010 81 cc 73 bb 0c a1 b5 04 82 11 7f 0a 88 18 06 06 |..s.............|
[6131 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 71 56 34 5e 91 ed 0f bb cd b9 3a |0D. .qV4^......:|
00000010 57 62 1a 3a ff af 55 9a e4 fc 89 f9 63 ad 24 85 |Wb.:..U.....c.$.|
00000020 d7 0f e2 9c 02 20 43 cd a6 74 c3 68 f3 e3 0b ce |..... C..t.h....|
00000030 9d 2a dd ac 37 21 e6 f5 59 b9 e3 87 4a 27 0a d0 |.*..7!..Y...J'..|
00000040 63 09 4e af f7 e7 |c.N...|
[6132 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes
[6133 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes
[6134 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6135 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[6136 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Persisting private data to transient store for txid [b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774] at block height [3]
[6137 02-22 00:15:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 a1 35 02 0d ad fe c8 bf 70 fb 19 ff 1a f2 d4 |..5......p......|
00000010 1d 70 96 7d 91 77 8b 94 65 96 be 3f 50 f9 a9 9e |.p.}.w..e..?P...|
[6138 02-22 00:15:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 10 50 db f0 93 5d 19 27 97 19 c9 |0D. ..P...].'...|
00000010 34 ab 92 77 ae 58 79 05 8d 64 a6 3e 1b 1f 48 06 |4..w.Xy..d.>..H.|
00000020 63 89 af eb 02 20 71 3a 5a 58 d3 63 19 48 1d 12 |c.... q:ZX.c.H..|
00000030 c5 86 ba c0 d0 25 ba 44 8b 87 ed 17 30 b3 60 59 |.....%.D....0.`Y|
00000040 74 7c d6 55 20 85 |t|.U .|
[6139 02-22 00:15:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774]
[613b 02-22 00:15:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU escc for chaincode _lifecycle is escc channel=businesschannel txID=b42a3228
[613c 02-22 00:15:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20F781B88D8B0961766569BC69B997...455254494649434154452D2D2D2D2D0A
[613d 02-22 00:15:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8DD20BF01C2A4E67969CBCE7C014101CF9F9D3C3E3DFC91D6C3D618F968348C2
[613e 02-22 00:15:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774]
[613f 02-22 00:15:58.56 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44916 grpc.code=OK grpc.call_duration=445.6731ms
[613a 02-22 00:15:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[6140 02-22 00:15:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[6141 02-22 00:15:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6142 02-22 00:15:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6143 02-22 00:15:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6144 02-22 00:15:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[6145 02-22 00:15:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[6146 02-22 00:15:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6149 02-22 00:15:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6148 02-22 00:15:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6147 02-22 00:15:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Starting new DeliverFiltered handler
[614a 02-22 00:15:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[614b 02-22 00:15:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[614c 02-22 00:15:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[614d 02-22 00:15:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[614e 02-22 00:15:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[614f 02-22 00:15:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb 5c 19 d5 fd a9 1e be 7c a8 80 89 43 93 3d 19 |.\......|...C.=.|
00000010 7d 92 a3 63 31 3b 91 bb 9a 75 56 68 f0 58 dc ab |}..c1;...uVh.X..|
[6150 02-22 00:15:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 6e 1a 0f 29 2c 52 c7 07 e8 3f 6f |0D. .n..),R...?o|
00000010 12 4a 73 f2 22 72 df 91 1b a7 60 6b e5 4d 1d 11 |.Js."r....`k.M..|
00000020 cc 30 2e 15 02 20 4b f6 4b f8 c2 e9 e9 a4 69 bb |.0... K.K.....i.|
00000030 86 6a 79 d5 cc dd d2 c6 66 03 ba 54 26 b8 95 0d |.jy.....f..T&...|
00000040 4d 17 a7 6b 68 67 |M..khg|
[6151 02-22 00:15:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6152 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d400 gate 1582330558581042500 evaluation starts
[6153 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d400 signed by 0 principal evaluation starts (used [false])
[6154 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d400 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6155 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6156 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d400 principal evaluation fails
[6157 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d400 gate 1582330558581042500 evaluation fails
[6158 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6159 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[615a 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[615b 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb 5c 19 d5 fd a9 1e be 7c a8 80 89 43 93 3d 19 |.\......|...C.=.|
00000010 7d 92 a3 63 31 3b 91 bb 9a 75 56 68 f0 58 dc ab |}..c1;...uVh.X..|
[615c 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 6e 1a 0f 29 2c 52 c7 07 e8 3f 6f |0D. .n..),R...?o|
00000010 12 4a 73 f2 22 72 df 91 1b a7 60 6b e5 4d 1d 11 |.Js."r....`k.M..|
00000020 cc 30 2e 15 02 20 4b f6 4b f8 c2 e9 e9 a4 69 bb |.0... K.K.....i.|
00000030 86 6a 79 d5 cc dd d2 c6 66 03 ba 54 26 b8 95 0d |.jy.....f..T&...|
00000040 4d 17 a7 6b 68 67 |M..khg|
[615d 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[615e 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362dd00 gate 1582330558582441000 evaluation starts
[615f 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362dd00 signed by 0 principal evaluation starts (used [false])
[6160 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362dd00 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6161 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362dd00 principal evaluation succeeds for identity 0
[6162 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362dd00 gate 1582330558582441000 evaluation succeeds
[6163 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6164 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6165 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6166 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6167 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes
[6168 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6169 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[616a 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 34 b6 76 95 01 54 08 13 50 9e 7d 75 bb 58 0a 7f |4.v..T..P.}u.X..|
00000010 81 cc 73 bb 0c a1 b5 04 82 11 7f 0a 88 18 06 06 |..s.............|
[616b 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 71 56 34 5e 91 ed 0f bb cd b9 3a |0D. .qV4^......:|
00000010 57 62 1a 3a ff af 55 9a e4 fc 89 f9 63 ad 24 85 |Wb.:..U.....c.$.|
00000020 d7 0f e2 9c 02 20 43 cd a6 74 c3 68 f3 e3 0b ce |..... C..t.h....|
00000030 9d 2a dd ac 37 21 e6 f5 59 b9 e3 87 4a 27 0a d0 |.*..7!..Y...J'..|
00000040 63 09 4e af f7 e7 |c.N...|
[616c 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes
[616d 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes
[616e 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[616f 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[6170 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 a1 35 02 0d ad fe c8 bf 70 fb 19 ff 1a f2 d4 |..5......p......|
00000010 1d 70 96 7d 91 77 8b 94 65 96 be 3f 50 f9 a9 9e |.p.}.w..e..?P...|
[6171 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 10 50 db f0 93 5d 19 27 97 19 c9 |0D. ..P...].'...|
00000010 34 ab 92 77 ae 58 79 05 8d 64 a6 3e 1b 1f 48 06 |4..w.Xy..d.>..H.|
00000020 63 89 af eb 02 20 71 3a 5a 58 d3 63 19 48 1d 12 |c.... q:ZX.c.H..|
00000030 c5 86 ba c0 d0 25 ba 44 8b 87 ed 17 30 b3 60 59 |.....%.D....0.`Y|
00000040 74 7c d6 55 20 85 |t|.U .|
[6172 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6173 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6174 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6175 02-22 00:15:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Starting new deliver loop for 172.18.0.9:44918
[6176 02-22 00:15:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to read seek info message from 172.18.0.9:44918
[6177 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock
[6178 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers)
[6179 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[617a 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[617b 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[617c 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 fa 0b 74 1e dd 60 74 c6 1c 31 6d 5b f4 72 ec |u..t..`t..1m[.r.|
00000010 24 a2 19 49 a8 97 78 ac 46 cd ec 27 61 47 bc 7f |$..I..x.F..'aG..|
[617d 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c c7 d9 b5 bb 79 7b f2 82 bc 79 91 |0D. \....y{...y.|
00000010 74 17 57 08 8a b9 54 c3 fe 4b 2c d2 de c9 75 c6 |t.W...T..K,...u.|
00000020 0f 58 7f f8 02 20 4a c4 65 e3 55 94 89 12 f9 c2 |.X... J.e.U.....|
00000030 85 b8 7b 1d f8 7f 57 8f 21 f4 e1 79 a3 8b 77 ec |..{...W.!..y..w.|
00000040 7f 9f 9e 15 e0 07 |......|
[617e 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[617f 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404d00 gate 1582330558591832400 evaluation starts
[6180 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404d00 signed by 0 principal evaluation starts (used [false])
[6181 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404d00 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[6182 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[6183 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[6184 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404d00 principal evaluation succeeds for identity 0
[6185 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404d00 gate 1582330558591832400 evaluation succeeds
[6186 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[6187 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6188 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6189 02-22 00:15:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[618a 02-22 00:15:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU [channel: businesschannel] Received seekInfo (0xc003d53980) start:<newest:<> > stop:<specified:<number:18446744073709551615 > > from 172.18.0.9:44918
[618b 02-22 00:15:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing block stream for iterator. itr.maxBlockNumAvailable=2
[618c 02-22 00:15:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[52127]
[618d 02-22 00:15:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[26010], Going to peek [8] bytes
[618e 02-22 00:15:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[26007], placementInfo={fileNum=[0], startOffset=[52127], bytesOffset=[52130]}
[618f 02-22 00:15:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU blockbytes [26007] read from file [0]
[6190 02-22 00:15:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU [channel: businesschannel] Delivering block [2] for (0xc003d53980) for 172.18.0.9:44918
[6191 02-22 00:15:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]
[6192 02-22 00:15:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6193 02-22 00:15:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6194 02-22 00:15:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6195 02-22 00:15:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[6196 02-22 00:15:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6197 02-22 00:15:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6198 02-22 00:15:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6199 02-22 00:15:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[619a 02-22 00:15:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[619b 02-22 00:15:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[619c 02-22 00:15:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[619d 02-22 00:15:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 54 7a 00 72 3a 5d 59 f3 94 59 01 2e 96 7b bf |.Tz.r:]Y..Y...{.|
00000010 18 8d 7a 27 5f db 59 49 e4 ea cc 03 fe 85 c2 bf |..z'_.YI........|
[619e 02-22 00:15:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 cf d1 59 b6 21 ae 06 9e f0 d9 99 |0D. ...Y.!......|
00000010 46 0b a9 83 f3 bd 90 86 a2 00 2c 94 3a 81 e1 4c |F.........,.:..L|
00000020 e6 2b 76 3f 02 20 14 a6 ca 3a 73 96 9c 0b e9 df |.+v?. ...:s.....|
00000030 3e 9a 7b 6a b6 98 bf d3 38 b6 be 8e 06 b0 1f b5 |>.{j....8.......|
00000040 bc 24 82 77 8e ae |.$.w..|
[619f 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[61a0 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323680 gate 1582330558630026300 evaluation starts
[61a1 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323680 signed by 0 principal evaluation starts (used [false])
[61a2 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323680 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[61a3 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[61a4 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323680 principal evaluation fails
[61a5 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323680 gate 1582330558630026300 evaluation fails
[61a6 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[61a7 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[61a8 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[61a9 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 54 7a 00 72 3a 5d 59 f3 94 59 01 2e 96 7b bf |.Tz.r:]Y..Y...{.|
00000010 18 8d 7a 27 5f db 59 49 e4 ea cc 03 fe 85 c2 bf |..z'_.YI........|
[61aa 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 cf d1 59 b6 21 ae 06 9e f0 d9 99 |0D. ...Y.!......|
00000010 46 0b a9 83 f3 bd 90 86 a2 00 2c 94 3a 81 e1 4c |F.........,.:..L|
00000020 e6 2b 76 3f 02 20 14 a6 ca 3a 73 96 9c 0b e9 df |.+v?. ...:s.....|
00000030 3e 9a 7b 6a b6 98 bf d3 38 b6 be 8e 06 b0 1f b5 |>.{j....8.......|
00000040 bc 24 82 77 8e ae |.$.w..|
[61ab 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[61ac 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323f80 gate 1582330558630435900 evaluation starts
[61ad 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323f80 signed by 0 principal evaluation starts (used [false])
[61ae 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323f80 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[61af 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323f80 principal evaluation succeeds for identity 0
[61b0 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323f80 gate 1582330558630435900 evaluation succeeds
[61b1 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[61b2 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[61b3 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[61b4 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[61b5 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[61b6 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes]}
[61b7 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:75
[61b8 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:75
[61b9 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:74 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[61ba 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[61bb 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[61bc 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[61bd 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[61be 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[61bf 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[61c0 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[61c1 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes to 1 peers
[61c2 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[61c3 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes
[61c4 02-22 00:15:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[61c5 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[61c6 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[61c7 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[61c8 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[61c9 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[61ca 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[61cb 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[61cc 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[61cd 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[61ce 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[61cf 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[61d0 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[61d1 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[61d2 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[61d3 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[61d4 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[61d5 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[61d6 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[61d7 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[61d8 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[61d9 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[61da 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[61db 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[61dc 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032db670 gate 1582330558979166400 evaluation starts
[61dd 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032db670 signed by 0 principal evaluation starts (used [false])
[61de 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032db670 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[61df 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032db670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[61e0 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032db670 principal evaluation fails
[61e1 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032db670 gate 1582330558979166400 evaluation fails
[61e2 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[61e3 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[61e4 02-22 00:15:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[61e5 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[61e6 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[61e7 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[61e8 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032dbf80 gate 1582330558980406500 evaluation starts
[61e9 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032dbf80 signed by 0 principal evaluation starts (used [false])
[61ea 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032dbf80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[61eb 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032dbf80 principal evaluation succeeds for identity 0
[61ec 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032dbf80 gate 1582330558980406500 evaluation succeeds
[61ed 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[61ee 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[61ef 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[61f0 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[61f1 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[61f2 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[61f3 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[61f4 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[61f5 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[61f6 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[61f7 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[61f8 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[61f9 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[61fa 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[61fb 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[61fc 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[61fd 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[61fe 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003234100 gate 1582330558983633200 evaluation starts
[61ff 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003234100 signed by 0 principal evaluation starts (used [false])
[6200 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003234100 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6201 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003234100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6202 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003234100 principal evaluation fails
[6203 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003234100 gate 1582330558983633200 evaluation fails
[6204 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6205 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6206 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6207 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[6208 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[6209 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[620a 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003234aa0 gate 1582330558985231700 evaluation starts
[620b 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003234aa0 signed by 0 principal evaluation starts (used [false])
[620c 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003234aa0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[620d 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003234aa0 principal evaluation succeeds for identity 0
[620e 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003234aa0 gate 1582330558985231700 evaluation succeeds
[620f 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6210 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6211 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6212 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6213 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[6214 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[6215 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6216 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[6217 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[6218 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[6219 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[621a 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[621b 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[621c 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[621d 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[621e 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[621f 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6220 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6221 02-22 00:15:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6222 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6223 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[6224 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[6225 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6226 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003221cb0 gate 1582330558990914600 evaluation starts
[6227 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003221cb0 signed by 0 principal evaluation starts (used [false])
[6228 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003221cb0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6229 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003221cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[622a 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003221cb0 principal evaluation fails
[622b 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003221cb0 gate 1582330558990914600 evaluation fails
[622c 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[622d 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[622e 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[622f 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[6230 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[6231 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6232 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ce5d0 gate 1582330558992727500 evaluation starts
[6233 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ce5d0 signed by 0 principal evaluation starts (used [false])
[6234 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ce5d0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6235 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ce5d0 principal evaluation succeeds for identity 0
[6236 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ce5d0 gate 1582330558992727500 evaluation succeeds
[6237 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6238 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6239 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[623a 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[623b 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[623c 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[623d 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[623e 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[623f 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6240 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6241 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6242 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6243 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[6244 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[6245 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6246 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aa1a0 gate 1582330558997173900 evaluation starts
[6247 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aa1a0 signed by 0 principal evaluation starts (used [false])
[6248 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aa1a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6249 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aa1a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[624a 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aa1a0 principal evaluation fails
[624b 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aa1a0 gate 1582330558997173900 evaluation fails
[624c 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[624d 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[624e 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[624f 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[6250 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[6251 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6252 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aabc0 gate 1582330558999486400 evaluation starts
[6253 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aabc0 signed by 0 principal evaluation starts (used [false])
[6254 02-22 00:15:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aabc0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6255 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aabc0 principal evaluation succeeds for identity 0
[6256 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aabc0 gate 1582330558999486400 evaluation succeeds
[6257 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6258 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6259 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[625a 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[625b 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[625c 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[625d 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[625e 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[625f 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6260 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6261 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6262 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6263 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6264 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6265 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6266 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[6267 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[6268 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6269 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e8d0 gate 1582330559003394000 evaluation starts
[626a 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e8d0 signed by 0 principal evaluation starts (used [false])
[626b 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e8d0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[626c 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[626d 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e8d0 principal evaluation fails
[626e 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e8d0 gate 1582330559003394000 evaluation fails
[626f 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6270 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6271 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6272 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[6273 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[6274 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6275 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318f230 gate 1582330559005601200 evaluation starts
[6276 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318f230 signed by 0 principal evaluation starts (used [false])
[6277 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318f230 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6278 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318f230 principal evaluation succeeds for identity 0
[6279 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318f230 gate 1582330559005601200 evaluation succeeds
[627a 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[627b 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[627c 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[627d 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[627e 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[627f 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[6280 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[6281 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[6282 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6283 02-22 00:15:59.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6284 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6285 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6286 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6287 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6288 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6289 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[628a 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[628b 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[628c 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[628d 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308da90 gate 1582330559012020900 evaluation starts
[628e 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308da90 signed by 0 principal evaluation starts (used [false])
[628f 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308da90 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6290 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308da90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6291 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308da90 principal evaluation fails
[6292 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308da90 gate 1582330559012020900 evaluation fails
[6293 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6294 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6295 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6296 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[6297 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[6298 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6299 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a390 gate 1582330559016411200 evaluation starts
[629a 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a390 signed by 0 principal evaluation starts (used [false])
[629b 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a390 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[629c 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a390 principal evaluation succeeds for identity 0
[629d 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a390 gate 1582330559016411200 evaluation succeeds
[629e 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[629f 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[62a0 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[62a1 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[62a2 02-22 00:15:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62a3 02-22 00:15:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[62a4 02-22 00:15:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[62a5 02-22 00:15:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[62a6 02-22 00:15:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[62a7 02-22 00:15:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[62a8 02-22 00:15:59.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15791171858277911092 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[62a9 02-22 00:15:59.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15791171858277911092 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[62aa 02-22 00:15:59.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62ab 02-22 00:15:59.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15791171858277911092 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[62ac 02-22 00:15:59.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15791171858277911092 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes
[62ad 02-22 00:15:59.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62ae 02-22 00:15:59.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[62af 02-22 00:15:59.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62b0 02-22 00:15:59.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[62b1 02-22 00:15:59.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[62b2 02-22 00:15:59.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 5b db 67 96 49 09 e7 33 fe 1b 87 ac 62 ba 6d |.[.g.I..3....b.m|
00000010 9c 5b 3a 11 6b c9 e6 30 25 ae 73 fe 3e 98 ef 91 |.[:.k..0%.s.>...|
[62b3 02-22 00:15:59.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f d8 95 73 56 62 c0 3e f8 15 ff a5 |0D. ?..sVb.>....|
00000010 39 2c 51 23 80 22 74 1b 4a 41 f5 96 af 6b 47 ae |9,Q#."t.JA...kG.|
00000020 ff 33 7e 93 02 20 6d a9 24 04 35 c4 14 d8 4d 66 |.3~.. m.$.5...Mf|
00000030 e5 00 ae b8 09 07 99 10 e7 08 f9 b6 14 c1 21 86 |..............!.|
00000040 ee 93 b9 ab ba dc |......|
[62b4 02-22 00:15:59.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[62b5 02-22 00:15:59.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 1d 5a 0c 08 6d 2e e6 f2 8c a5 |0E.!...Z..m.....|
00000010 8a ff 8a 7f 3f 25 96 8a 2d 4d 75 5b 7a 08 52 10 |....?%..-Mu[z.R.|
00000020 0b 34 8c 68 a6 02 20 5c 72 95 2f 4f d2 fc ce ec |.4.h.. \r./O....|
00000030 7a 2a 92 8a bd 19 99 c7 13 bf b3 3d fa e2 26 1f |z*.........=..&.|
00000040 54 b9 4c fb a7 1f 57 |T.L...W|
[62b6 02-22 00:15:59.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[62b7 02-22 00:15:59.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[62b8 02-22 00:15:59.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:79
[62b9 02-22 00:15:59.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:79
[62ba 02-22 00:15:59.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[62bb 02-22 00:15:59.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62bc 02-22 00:15:59.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62bd 02-22 00:15:59.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62be 02-22 00:15:59.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[62bf 02-22 00:15:59.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[62c0 02-22 00:15:59.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[62c1 02-22 00:15:59.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[62c2 02-22 00:15:59.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[62c3 02-22 00:15:59.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[62c4 02-22 00:15:59.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[62c5 02-22 00:15:59.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62c6 02-22 00:15:59.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[62c7 02-22 00:15:59.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62c8 02-22 00:15:59.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[62c9 02-22 00:15:59.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62ca 02-22 00:15:59.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[62cb 02-22 00:15:59.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62cc 02-22 00:15:59.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[62cd 02-22 00:15:59.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[62ce 02-22 00:15:59.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62cf 02-22 00:15:59.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[62d0 02-22 00:15:59.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62d1 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[62d2 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[62d3 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62d4 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[62d5 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[62d6 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[62d7 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[62d8 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[62d9 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[62da 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[62db 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[62dc 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[62dd 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[62de 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 c8 50 73 98 5e dd 58 35 1c 9a b6 b8 29 ca 0e |P.Ps.^.X5....)..|
00000010 ba 34 96 bf 13 3c 2a a1 75 d7 3e 86 c4 7f 8e 96 |.4...<*.u.>.....|
[62df 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 40 7a a8 4a 37 8e d6 28 13 f1 d8 |0D. S@z.J7..(...|
00000010 17 33 43 81 12 e6 ec 22 f7 ca 55 c7 df 74 aa 92 |.3C...."..U..t..|
00000020 5b 19 8f 21 02 20 49 88 af 82 bb cd 5c 26 f0 f4 |[..!. I.....\&..|
00000030 98 24 05 98 6c 43 38 38 9b 98 6d 13 17 5b c8 84 |.$..lC88..m..[..|
00000040 27 4c db 90 e9 82 |'L....|
[62e0 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[62e1 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd6e20 gate 1582330559279414400 evaluation starts
[62e2 02-22 00:15:59.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd6e20 signed by 0 principal evaluation starts (used [false])
[62e3 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd6e20 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[62e4 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd6e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[62e5 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd6e20 principal evaluation fails
[62e6 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd6e20 gate 1582330559279414400 evaluation fails
[62e7 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[62e8 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[62e9 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[62ea 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 c8 50 73 98 5e dd 58 35 1c 9a b6 b8 29 ca 0e |P.Ps.^.X5....)..|
00000010 ba 34 96 bf 13 3c 2a a1 75 d7 3e 86 c4 7f 8e 96 |.4...<*.u.>.....|
[62eb 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 40 7a a8 4a 37 8e d6 28 13 f1 d8 |0D. S@z.J7..(...|
00000010 17 33 43 81 12 e6 ec 22 f7 ca 55 c7 df 74 aa 92 |.3C...."..U..t..|
00000020 5b 19 8f 21 02 20 49 88 af 82 bb cd 5c 26 f0 f4 |[..!. I.....\&..|
00000030 98 24 05 98 6c 43 38 38 9b 98 6d 13 17 5b c8 84 |.$..lC88..m..[..|
00000040 27 4c db 90 e9 82 |'L....|
[62ec 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[62ed 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd7730 gate 1582330559282957300 evaluation starts
[62ee 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd7730 signed by 0 principal evaluation starts (used [false])
[62ef 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd7730 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[62f0 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd7730 principal evaluation succeeds for identity 0
[62f1 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dd7730 gate 1582330559282957300 evaluation succeeds
[62f2 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[62f3 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[62f4 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[62f5 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[62f6 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[62f7 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes]}
[62f8 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:78
[62f9 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:78
[62fa 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:77 , Envelope: 83 bytes, Signature: 69 bytes in aliveMembership
[62fb 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62fc 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62fd 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62fe 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[62ff 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6300 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6301 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6302 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6303 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6304 02-22 00:15:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6305 02-22 00:15:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6306 02-22 00:15:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6307 02-22 00:15:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6308 02-22 00:15:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6309 02-22 00:15:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[630a 02-22 00:15:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[630b 02-22 00:15:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[630c 02-22 00:15:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[630d 02-22 00:15:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[630e 02-22 00:15:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[630f 02-22 00:15:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6310 02-22 00:15:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6311 02-22 00:15:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6312 02-22 00:15:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6313 02-22 00:15:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[6314 02-22 00:15:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[6315 02-22 00:15:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA15101C1801
[6316 02-22 00:15:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 17FE86BC73765B0804B8CA9A2AD6E4A389D1231EA14FBCDE927D77646D79D8F2
[6317 02-22 00:15:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[6318 02-22 00:15:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6319 02-22 00:15:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[631a 02-22 00:15:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[631b 02-22 00:15:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[631c 02-22 00:15:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:28 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[631d 02-22 00:15:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:28 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[631e 02-22 00:15:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6320 02-22 00:15:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[631f 02-22 00:15:59.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6321 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[6322 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[6323 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6324 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[6325 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[6326 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6327 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6328 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6329 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[632a 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[632b 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[632c 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[632d 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 24 6c a9 f4 8c 8e 88 b4 66 95 9f 77 6b ee bb |E$l......f..wk..|
00000010 2a 47 16 c7 d3 a5 cd 1e c8 69 ba 13 66 5e 86 c9 |*G.......i..f^..|
[632e 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 0e db 49 35 35 d1 00 12 80 80 |0E.!....I55.....|
00000010 f8 8c 51 bc 2d 96 8c 41 ac 46 03 69 ca b2 91 1c |..Q.-..A.F.i....|
00000020 b6 cc 0b 30 bd 02 20 36 05 91 49 1d ce 61 af f7 |...0.. 6..I..a..|
00000030 7d e7 04 63 ac fc 91 94 6a 91 d8 b1 ba 55 88 12 |}..c....j....U..|
00000040 d6 cc 0b f5 e6 a1 9c |.......|
[632f 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6330 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3080 gate 1582330559358871300 evaluation starts
[6331 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3080 signed by 0 principal evaluation starts (used [false])
[6332 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3080 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6333 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6334 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3080 principal evaluation fails
[6335 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc3080 gate 1582330559358871300 evaluation fails
[6336 02-22 00:15:59.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6337 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6338 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6339 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 24 6c a9 f4 8c 8e 88 b4 66 95 9f 77 6b ee bb |E$l......f..wk..|
00000010 2a 47 16 c7 d3 a5 cd 1e c8 69 ba 13 66 5e 86 c9 |*G.......i..f^..|
[633a 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 0e db 49 35 35 d1 00 12 80 80 |0E.!....I55.....|
00000010 f8 8c 51 bc 2d 96 8c 41 ac 46 03 69 ca b2 91 1c |..Q.-..A.F.i....|
00000020 b6 cc 0b 30 bd 02 20 36 05 91 49 1d ce 61 af f7 |...0.. 6..I..a..|
00000030 7d e7 04 63 ac fc 91 94 6a 91 d8 b1 ba 55 88 12 |}..c....j....U..|
00000040 d6 cc 0b f5 e6 a1 9c |.......|
[633b 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[633c 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc39a0 gate 1582330559361002700 evaluation starts
[633d 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc39a0 signed by 0 principal evaluation starts (used [false])
[633e 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc39a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[633f 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc39a0 principal evaluation succeeds for identity 0
[6340 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc39a0 gate 1582330559361002700 evaluation succeeds
[6342 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[6341 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6343 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6344 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6345 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6346 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[6347 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes]}
[6348 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:76
[6349 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:76
[634a 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[634b 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[634c 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[634d 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[634e 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[634f 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6350 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6351 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[6352 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6353 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[6354 02-22 00:15:59.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6355 02-22 00:15:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6356 02-22 00:15:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6357 02-22 00:15:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6358 02-22 00:15:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6359 02-22 00:15:59.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[635a 02-22 00:15:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[635b 02-22 00:15:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[635c 02-22 00:15:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[635d 02-22 00:15:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[635e 02-22 00:15:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[635f 02-22 00:15:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[6360 02-22 00:15:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6361 02-22 00:15:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes
[6362 02-22 00:15:59.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6363 02-22 00:15:59.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[6364 02-22 00:15:59.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6365 02-22 00:15:59.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6366 02-22 00:15:59.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6367 02-22 00:15:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15104B
[6368 02-22 00:15:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6D6E464B74AC52CB65240022489CC527A5A9105EF7FBC7A87DC8CAE7B31CA158
[6369 02-22 00:15:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[636a 02-22 00:15:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[636b 02-22 00:15:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[636c 02-22 00:15:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[636d 02-22 00:15:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[636e 02-22 00:15:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[636f 02-22 00:15:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6370 02-22 00:15:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[6371 02-22 00:15:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6373 02-22 00:15:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6374 02-22 00:15:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[6375 02-22 00:15:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6372 02-22 00:15:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6376 02-22 00:15:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[6377 02-22 00:15:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:75 , Envelope: 83 bytes, Signature: 70 bytes
[6378 02-22 00:15:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6379 02-22 00:15:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3544746169026523180 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[637a 02-22 00:15:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3544746169026523180 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[637b 02-22 00:15:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[637c 02-22 00:15:59.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[637d 02-22 00:15:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[637e 02-22 00:15:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[637f 02-22 00:15:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6380 02-22 00:15:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6381 02-22 00:15:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6382 02-22 00:16:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[6383 02-22 00:16:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[6384 02-22 00:16:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6385 02-22 00:16:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6386 02-22 00:16:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6387 02-22 00:16:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6388 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6389 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[638a 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[638b 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[638c 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[638d 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[638e 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[638f 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a b8 29 dc 08 94 8d fa 99 35 80 08 cc 6b 64 4e |..)......5...kdN|
00000010 5e c5 b1 72 c6 09 5b 8b 55 74 52 cd 22 0d 06 ce |^..r..[.UtR."...|
[6390 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 46 a8 f6 a2 07 b5 f6 23 17 d1 63 |0D. .F......#..c|
00000010 e9 52 c7 4d 03 8f 94 f8 c4 c3 23 2f 04 52 a9 d1 |.R.M......#/.R..|
00000020 b2 d1 a6 b2 02 20 67 d1 fc 50 84 b2 63 50 13 de |..... g..P..cP..|
00000030 4a 23 3a 8e e5 74 a0 fa 9a 70 4e 67 18 ab d0 e9 |J#:..t...pNg....|
00000040 e8 47 42 72 9a 07 |.GBr..|
[6391 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6392 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b59f20 gate 1582330560724719300 evaluation starts
[6393 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b59f20 signed by 0 principal evaluation starts (used [false])
[6394 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b59f20 processing identity 0 - &{OrdererMSP 9de2412befbda85787d990eb15cf69142545cfd8abf27ca5a151a46e885ec6cd}
[6395 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP
[6396 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[6397 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b59f20 principal evaluation succeeds for identity 0
[6398 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b59f20 gate 1582330560724719300 evaluation succeeds
[6399 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[639a 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[639b 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[639c 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[639d 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [3] channel=businesschannel
[639e 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3]
[639f 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks
[63a0 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3]
[63a1 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger
[63a2 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer
[63a3 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3]
[63a4 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3]
[63a5 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[63a6 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [3] channel=businesschannel
[63a7 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4748 bytes, seq: 3}, Envelope: 4778 bytes, Signature: 0 bytes to the block puller
[63a8 02-22 00:16:00.72 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3
[63a9 02-22 00:16:00.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003ac1600 env 0xc003237360 txn 0
[63aa 02-22 00:16:00.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[63ab 02-22 00:16:00.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[63ac 02-22 00:16:00.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[63ad 02-22 00:16:00.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[63ae 02-22 00:16:00.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4748 bytes, seq: 3}, Envelope: 4778 bytes, Signature: 0 bytes to 1 peers
[63af 02-22 00:16:00.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[63b0 02-22 00:16:00.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[63b1 02-22 00:16:00.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4748 bytes, seq: 3}, Envelope: 4778 bytes, Signature: 0 bytes
[63b2 02-22 00:16:00.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[63b3 02-22 00:16:00.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003237360
[63b4 02-22 00:16:00.74 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\013\010\276\345\301\362\005\020\360\334\2657\"\017businesschannel*@b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774:\016\022\014\022\n_lifecycle" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXaqnq5GV16yVvuxgw6xr3uLKOdgZjaJ5KL5zoac=\n-----END CERTIFICATE-----\n\022\030ee\351\315\022\300\325\345\r\005\252\214K4\210>\014\037\001;\216\365\272\243"
[63b5 02-22 00:16:00.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3
[63b6 02-22 00:16:00.74 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[63b7 02-22 00:16:00.74 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[63b8 02-22 00:16:00.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[63b9 02-22 00:16:00.75 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[63ba 02-22 00:16:00.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 5d 51 da eb 58 e1 df 0f bf e7 3d 40 4b f4 11 |.]Q..X.....=@K..|
00000010 77 c3 94 64 ee ad 39 ee 85 24 94 09 19 39 8b 42 |w..d..9..$...9.B|
[63bb 02-22 00:16:00.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 77 d2 c3 86 10 3b f9 d7 4a 6b ee |0D. Tw....;..Jk.|
00000010 4c b6 57 90 16 65 2a eb 8f 3c af d4 69 ae 24 5f |L.W..e*..<..i.$_|
00000020 18 60 e8 fe 02 20 6a 1e d9 81 c2 3b e0 2c 9e 74 |.`... j....;.,.t|
00000030 19 89 8f f2 f9 ed ee 1d e0 0e 85 91 51 51 09 3f |............QQ.?|
00000040 34 c4 75 48 3c 71 |4.uH<q|
[63bc 02-22 00:16:00.75 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[63bd 02-22 00:16:00.75 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc00021d500, header channel_header:"\010\003\032\013\010\276\345\301\362\005\020\360\334\2657\"\017businesschannel*@b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774:\016\022\014\022\n_lifecycle" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXaqnq5GV16yVvuxgw6xr3uLKOdgZjaJ5KL5zoac=\n-----END CERTIFICATE-----\n\022\030ee\351\315\022\300\325\345\r\005\252\214K4\210>\014\037\001;\216\365\272\243"
[63be 02-22 00:16:00.75 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions
[63bf 02-22 00:16:00.75 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid
[63c0 02-22 00:16:00.75 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s(<nil>)
[63c1 02-22 00:16:00.75 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[63c2 02-22 00:16:00.75 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774]
[63c3 02-22 00:16:00.75 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x62, 0x34, 0x32, 0x61, 0x33, 0x32, 0x32, 0x38, 0x64, 0x37, 0x62, 0x64, 0x61, 0x63, 0x63, 0x39, 0x34, 0x33, 0x62, 0x31, 0x65, 0x39, 0x66, 0x33, 0x33, 0x32, 0x38, 0x36, 0x35, 0x38, 0x32, 0x37, 0x38, 0x64, 0x63, 0x37, 0x32, 0x66, 0x62, 0x36, 0x64, 0x38, 0x66, 0x62, 0x38, 0x63, 0x34, 0x65, 0x64, 0x62, 0x39, 0x31, 0x66, 0x65, 0x30, 0x37, 0x65, 0x66, 0x62, 0x30, 0x30, 0x37, 0x37, 0x34}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x62, 0x34, 0x32, 0x61, 0x33, 0x32, 0x32, 0x38, 0x64, 0x37, 0x62, 0x64, 0x61, 0x63, 0x63, 0x39, 0x34, 0x33, 0x62, 0x31, 0x65, 0x39, 0x66, 0x33, 0x33, 0x32, 0x38, 0x36, 0x35, 0x38, 0x32, 0x37, 0x38, 0x64, 0x63, 0x37, 0x32, 0x66, 0x62, 0x36, 0x64, 0x38, 0x66, 0x62, 0x38, 0x63, 0x34, 0x65, 0x64, 0x62, 0x39, 0x31, 0x66, 0x65, 0x30, 0x37, 0x65, 0x66, 0x62, 0x30, 0x30, 0x37, 0x37, 0x34, 0xff}]
[63c4 02-22 00:16:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction with plugins
[63c5 02-22 00:16:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch starts for bytes 0xc002c51000
[63c6 02-22 00:16:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [688adb93-703a-44af-b80d-7d5e9ddb1fa6]
[63c7 02-22 00:16:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [688adb93-703a-44af-b80d-7d5e9ddb1fa6]
[63c8 02-22 00:16:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin
[63c9 02-22 00:16:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [d479175d-577d-4f54-b0ce-1dbe71bd9a66]
[63ca 02-22 00:16:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[63cb 02-22 00:16:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > maximum_peer_count:1 > > ]
[63cc 02-22 00:16:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d479175d-577d-4f54-b0ce-1dbe71bd9a66]
[63cd 02-22 00:16:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [5cb5916d-cf5c-46c9-b54a-cb49f7820015]
[63ce 02-22 00:16:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5cb5916d-cf5c-46c9-b54a-cb49f7820015]
[63cf 02-22 00:16:00.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement ==
[63d0 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[63d1 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[63d2 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d d2 0b f0 1c 2a 4e 67 96 9c bc e7 c0 14 10 1c |.....*Ng........|
00000010 f9 f9 d3 c3 e3 df c9 1d 6c 3d 61 8f 96 83 48 c2 |........l=a...H.|
[63d3 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 33 fc 01 f5 33 27 2e ba bb 8f |0E.!..3...3'....|
00000010 e8 29 b9 20 eb 02 91 1e 35 ff e6 ba 08 ec fc 17 |.). ....5.......|
00000020 05 18 1a 56 e8 02 20 3b 0b fd 54 85 6b bb cf 55 |...V.. ;..T.k..U|
00000030 21 21 c1 5e e3 e4 65 37 ed 1b 5e c7 f6 ca 6d 84 |!!.^..e7..^...m.|
00000040 aa 61 99 0a c2 b8 17 |.a.....|
[63d4 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[63d5 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f13f0 gate 1582330560775201600 evaluation starts
[63d6 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f13f0 signed by 0 principal evaluation starts (used [false])
[63d7 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f13f0 processing identity 0 - &{Org1MSP 7d0df2506ac221e9752cec5e841f5c7482dfa0c77748a65771953394012282dd}
[63d8 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[63d9 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[63da 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[63db 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f13f0 principal evaluation succeeds for identity 0
[63dc 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008f13f0 gate 1582330560775201600 evaluation succeeds
[63dd 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement
[63de 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement
[63df 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4643029d-e20d-44f4-b792-1fed38fec0d7]
[63e0 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[63e1 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > maximum_peer_count:1 > > ]
[63e2 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4643029d-e20d-44f4-b792-1fed38fec0d7]
[63e3 02-22 00:16:00.77 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [3f97e960-2b1a-46df-bf2e-032b8b10d94b]
[63e4 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[63e5 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > maximum_peer_count:1 > > ]
[63e6 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3f97e960-2b1a-46df-bf2e-032b8b10d94b]
[63e7 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [c59b2ab6-1938-4125-ac8d-3e99e9ea0c74]
[63e8 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[63e9 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > maximum_peer_count:1 > > ]
[63ea 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c59b2ab6-1938-4125-ac8d-3e99e9ea0c74]
[63eb 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [b018f7bf-08f9-4ea5-b830-eff1d45e9eec]
[63ec 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[63ed 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > maximum_peer_count:1 > > config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > ]
[63ee 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b018f7bf-08f9-4ea5-b830-eff1d45e9eec]
[63ef 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [55d0bad0-1d97-4248-beb3-5ca541d7bdc1]
[63f0 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[63f1 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > maximum_peer_count:1 > > ]
[63f2 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [55d0bad0-1d97-4248-beb3-5ca541d7bdc1]
[63f3 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: _lifecycle, tx 0 validation results is: <nil>
[63f4 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774 appears to be valid
[63f5 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch completes env bytes 0xc002c51000
[63f6 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003ac1600 env 0xc003237360 txn 0
[63f7 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[63f8 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 58ms
[63f9 02-22 00:16:00.78 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [c00ff48d-eb11-4d1d-8431-451e6f0e5282]
[63fa 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c00ff48d-eb11-4d1d-8431-451e6f0e5282]
[63fb 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[63fc 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 68 7a ad f8 62 bd 77 6c 8f c1 8b 8e 9f 8e 20 |fhz..b.wl...... |
00000010 08 97 14 85 6e e2 33 b3 90 2a 59 1d 0d 5f 29 25 |....n.3..*Y.._)%|
[63fd 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 de 83 42 9c 50 b0 3f 43 d0 83 |0E.!....B.P.?C..|
00000010 66 d3 60 ab 0c 27 44 78 1d eb f7 1b df 59 11 64 |f.`..'Dx.....Y.d|
00000020 c0 0a ac 4f 29 02 20 07 9b 47 a5 a2 90 63 6c 5e |...O). ..G...cl^|
00000030 74 f3 bc f9 0a 28 4e ae a7 1d b2 75 af f7 0a 80 |t....(N....u....|
00000040 c7 8a d0 e9 6e 2d 26 |....n-&|
[63fe 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[63ff 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d6c50 gate 1582330560792091900 evaluation starts
[6400 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d6c50 signed by 0 principal evaluation starts (used [false])
[6401 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d6c50 processing identity 0 - &{Org1MSP 7d0df2506ac221e9752cec5e841f5c7482dfa0c77748a65771953394012282dd}
[6402 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d6c50 principal evaluation succeeds for identity 0
[6403 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d6c50 gate 1582330560792091900 evaluation succeeds
[6404 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 1 private write sets from cache. channel=businesschannel
[6405 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Could not find all collection private write sets in cache for block [3] channel=businesschannel
[6406 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetching 1 collection private write sets from transient store channel=businesschannel
[6407 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 1 private write sets from transient store. channel=businesschannel
[6408 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Getting private data from transient store for transaction b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774
[6409 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x62, 0x34, 0x32, 0x61, 0x33, 0x32, 0x32, 0x38, 0x64, 0x37, 0x62, 0x64, 0x61, 0x63, 0x63, 0x39, 0x34, 0x33, 0x62, 0x31, 0x65, 0x39, 0x66, 0x33, 0x33, 0x32, 0x38, 0x36, 0x35, 0x38, 0x32, 0x37, 0x38, 0x64, 0x63, 0x37, 0x32, 0x66, 0x62, 0x36, 0x64, 0x38, 0x66, 0x62, 0x38, 0x63, 0x34, 0x65, 0x64, 0x62, 0x39, 0x31, 0x66, 0x65, 0x30, 0x37, 0x65, 0x66, 0x62, 0x30, 0x30, 0x37, 0x37, 0x34, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x62, 0x34, 0x32, 0x61, 0x33, 0x32, 0x32, 0x38, 0x64, 0x37, 0x62, 0x64, 0x61, 0x63, 0x63, 0x39, 0x34, 0x33, 0x62, 0x31, 0x65, 0x39, 0x66, 0x33, 0x33, 0x32, 0x38, 0x36, 0x35, 0x38, 0x32, 0x37, 0x38, 0x64, 0x63, 0x37, 0x32, 0x66, 0x62, 0x36, 0x64, 0x38, 0x66, 0x62, 0x38, 0x63, 0x34, 0x65, 0x64, 0x62, 0x39, 0x31, 0x66, 0x65, 0x30, 0x37, 0x65, 0x66, 0x62, 0x30, 0x30, 0x37, 0x37, 0x34, 0xff}]
[640a 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from remote peers channel=businesschannel
[640b 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [3] channel=businesschannel
[640c 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3]
[640d 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[640e 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[640f 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[6410 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3]
[6411 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[6412 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION
[6413 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[6414 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[6415 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[6416 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/metadata/exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[6417 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'
[6418 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[6419 02-22 00:16:00.79 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02
[641a 02-22 00:16:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[641b 02-22 00:16:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774] marked as valid by state validator. ContainsPostOrderWrites [false]
[641c 02-22 00:16:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc0038dbe40), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xa5\xfe\x94\xf5>{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc0038dbfc0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc0038dbdc0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc0038dbe00), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4<k\xbe\x06\f\xfcG4\x15\xdc\xc8\x17\xa4ψ\xe6\x8a\xc9.ܿ"}:(*internal.keyOps)(0xc0038dbf80), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xf6\xdc\xd0h\x9a-\xbb\x81\xcei\x88u\xd7E\x85\xf3\xdf\xf1^\xb0\x06kꞐ\x9d\x80\x95\x85\xcc\x13\xa9"}:(*internal.keyOps)(0xc0038dbf40)}
[641d 02-22 00:16:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[641e 02-22 00:16:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[641f 02-22 00:16:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[6420 02-22 00:16:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6F121408ACB284A6AEA4E4FA15...0F0A0A5F6C6966656379636C65120131
[6421 02-22 00:16:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D0A7F51538DD52E3DB7EDDFE9AEBD7198BAEB52BD0CFB0AAE6E909F6073F4532
[6422 02-22 00:16:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0xc0003d21a0 0xc00034c080 0xc0003451b0 0xc0002704f0}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[xb<78><62><07><>|T)sIO<49><4F>7<<3C><><EFBFBD>J<EFBFBD>H<19><><EFBFBD><EFBFBD><14>:%!s(*lifecycle.LocalChaincode=&{0xc003170600 map[]})] %!s(*lifecycle.EventBroker=&{0xc00034c080 0xc0002cdb20 0xc0003451b0 0xc0002cf170 {0 0} map[]}) %!s(*lifecycle.MetadataManager=&{{0 0} [0x15fb690] map[businesschannel:[]] map[businesschannel:[{_lifecycle 1 [18 41 47 67 104 97 110 110 101 108 47 65 112 112 108 105 99 97 116 105 111 110 47 76 105 102 101 99 121 99 108 101 69 110 100 111 114 115 101 109 101 110 116] [] <nil> true true}]]}) %!s(*lifecycle.ChaincodeCustodian=&{0xc000340e80 {0 0} [] false})}
[6423 02-22 00:16:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}
[6424 02-22 00:16:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]
[6425 02-22 00:16:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000340e40 0x2670c08})}
[6426 02-22 00:16:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000340e40 0x2670c08}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 81 73 77 50 111 117 57 68 113 102 118 107 75 116 105 85 79 90 72 107 108 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 69 121 77 106 103 119 77 68 85 120 77 68 66 97 70 119 48 121 79 84 69 121 77 106 85 119 77 68 85 120 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 73 57 118 88 79 50 100 103 50 111 103 70 10 57 71 55 78 107 116 101 97 74 97 112 121 83 85 54 55 49 82 105 75 99 73 110 78 118 51 79 65 100 73 114 43 120 115 110 49 49 87 102 55 84 77 54 57 52 79 119 55 47 71 87 115 71 85 55 49 111 90 84 90 98 72 102 119 10 105 53 83 102 75 108 97 98 77 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 48 121 52 86 118 99 90 67 76 100 83 112 108 97 104 79 71 75 84 48 53 104 99 74 105 82 85 101 111 113 86 109 69 81 104 87 98 43 112 55 121 78 69 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 72 116 97 113 104 114 57 47 98 120 105 103 67 121 104 117 75 113 89 113 68 122 116 119 51 117 69 49 49 113 117 73 90 55 100 114 107 97 89 47 109 118 81 67 73 71 86 116 105 112 108 43 10 79 56 86 121 56 52 117 108 84 82 108 118 116 97 102 68 53 101 86 74 117 113 54 73 114 80 57 66 114 111 70 120 117 49 68 74 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 179 183 184 118 70 59 160 172 8 127 94 65 226 212 86 227 28 96 8 133 49 250 55 11 53 150 142 239 86 215 172 210 2 32 100 89 81 91 46 235 16 150 255 121 87 170 193 209 185 37 14 142 30 237 8 252 234 108 47 230 40 153 117 116 137 125]} 0x15fb3f0}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc000277da0 0xc000419960 {{0 0} 0 0 0 0} {false}})]}
[6427 02-22 00:16:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000340e40 0x2670c08}) %!s(*confighistory.dbProvider=&{0xc0008fcee0})}
[6428 02-22 00:16:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3]
[6429 02-22 00:16:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage
[642a 02-22 00:16:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store
[642b 02-22 00:16:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [ff10b01b-d08a-4cd3-8cd3-b896b5e87529]
[642c 02-22 00:16:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ff10b01b-d08a-4cd3-8cd3-b896b5e87529]
[642d 02-22 00:16:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3]
[642e 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3]
[642f 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0xce, 0xd3, 0x92, 0x6f, 0x87, 0x4d, 0x2, 0xa4, 0x3, 0x98, 0xdb, 0x28, 0xc7, 0x58, 0x64, 0x90, 0x8e, 0x25, 0xea, 0xfa, 0x45, 0x8e, 0x44, 0x5f, 0x7f, 0x92, 0xc7, 0x48, 0xfe, 0xe9, 0xb5, 0x69} txOffsets=
txId=b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774 locPointer=offset=70, bytesLength=3739
]
[6430 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=78207, bytesLength=3739] for tx ID: [b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774] to txid-index
[6431 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=78207, bytesLength=3739] for tx number:[0] ID: [b42a3228d7bdacc943b1e9f3328658278dc72fb6d8fb8c4edb91fe07efb00774] to blockNumTranNum index
[6432 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[82907], isChainEmpty=[false], lastBlockNumber=[3]
[6433 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Came out of wait. maxAvailaBlockNumber=[3]
[6434 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[4770], Going to peek [8] bytes
[6435 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[4768], placementInfo={fileNum=[0], startOffset=[78137], bytesOffset=[78139]}
[6436 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU blockbytes [4768] read from file [0]
[6437 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database
[6438 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[6439 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[643a 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[643b 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]
[643c 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]
[643d 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]
[643e 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]
[643f 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]
[6440 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]
[6441 02-22 00:16:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[6442 02-22 00:16:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org1MSP<00><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xe5, 0x92, 0x1f, 0x81, 0x52, 0xdf, 0xf6, 0x8c, 0x18, 0x6c, 0xa4, 0x3c, 0x6b, 0xbe, 0x6, 0xc, 0xfc, 0x47, 0x34, 0x15, 0xdc, 0xc8, 0x17, 0xa4, 0xcf, 0x88, 0xe6, 0x8a, 0xc9, 0x2e, 0xdc, 0xbf}]
[6443 02-22 00:16:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org1MSP<00><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]
<EFBFBD><EFBFBD><EFBFBD>Ժ<EFBFBD>] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]
[6445 02-22 00:16:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org1MSP<00><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]
[6446 02-22 00:16:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org1MSP4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]
[6447 02-22 00:16:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org1MSP<00><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]
[6448 02-22 00:16:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/ValidationInfo] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]
[6449 02-22 00:16:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$p_implicit_org_Org1MSPnamespaces/metadata/exp02#1] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]
[644a 02-22 00:16:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/fields/exp02#1/PackageID] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x50, 0x61, 0x63, 0x6b, 0x61, 0x67, 0x65, 0x49, 0x44}]
[644b 02-22 00:16:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/metadata/exp02#1] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]
[644c 02-22 00:16:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/Collections] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]
[644d 02-22 00:16:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/EndorsementInfo] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]
[644e 02-22 00:16:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[644f 02-22 00:16:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[6450 02-22 00:16:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database
[6451 02-22 00:16:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4]
[6452 02-22 00:16:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions
[6453 02-22 00:16:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}]
[6454 02-22 00:16:00.85 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4]
[6455 02-22 00:16:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3]
[6456 02-22 00:16:00.87 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 74ms (state_validation=14ms block_and_pvtdata_commit=15ms state_commit=31ms) commitHash=[6a5d49ee89b6c9a53d4e51a9b89bd0786cc14481ca571fd8d992a6884dbb2334]
[6457 02-22 00:16:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Purging private data from transient store for committed txids
[6458 02-22 00:16:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x62, 0x34, 0x32, 0x61, 0x33, 0x32, 0x32, 0x38, 0x64, 0x37, 0x62, 0x64, 0x61, 0x63, 0x63, 0x39, 0x34, 0x33, 0x62, 0x31, 0x65, 0x39, 0x66, 0x33, 0x33, 0x32, 0x38, 0x36, 0x35, 0x38, 0x32, 0x37, 0x38, 0x64, 0x63, 0x37, 0x32, 0x66, 0x62, 0x36, 0x64, 0x38, 0x66, 0x62, 0x38, 0x63, 0x34, 0x65, 0x64, 0x62, 0x39, 0x31, 0x66, 0x65, 0x30, 0x37, 0x65, 0x66, 0x62, 0x30, 0x30, 0x37, 0x37, 0x34, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x62, 0x34, 0x32, 0x61, 0x33, 0x32, 0x32, 0x38, 0x64, 0x37, 0x62, 0x64, 0x61, 0x63, 0x63, 0x39, 0x34, 0x33, 0x62, 0x31, 0x65, 0x39, 0x66, 0x33, 0x33, 0x32, 0x38, 0x36, 0x35, 0x38, 0x32, 0x37, 0x38, 0x64, 0x63, 0x37, 0x32, 0x66, 0x62, 0x36, 0x64, 0x38, 0x66, 0x62, 0x38, 0x63, 0x34, 0x65, 0x64, 0x62, 0x39, 0x31, 0x66, 0x65, 0x30, 0x37, 0x65, 0x66, 0x62, 0x30, 0x30, 0x37, 0x37, 0x34, 0xff}]
[6459 02-22 00:16:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU [channel: businesschannel] Delivering block [3] for (0xc003d53980) for 172.18.0.9:44918
[645a 02-22 00:16:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6F121408ACB284A6AEA4E4FA15...0F0A0A5F6C6966656379636C65120131
[645b 02-22 00:16:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 79C89897882530B09110766215C1EC54D6615DAFB0CF3A0ADA2F4D25676CB947
[645c 02-22 00:16:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s)
[645d 02-22 00:16:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[645e 02-22 00:16:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[645f 02-22 00:16:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Context canceled, aborting wait for next block
[6460 02-22 00:16:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]
[6461 02-22 00:16:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Came out of wait. maxAvailaBlockNumber=[3]
[6462 02-22 00:16:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Closing Deliver stream
[6463 02-22 00:16:00.89 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2020-02-22T00:16:28.565Z grpc.peer_address=172.18.0.9:44918 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.3285929s
[6464 02-22 00:16:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:3306828578791870277 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6465 02-22 00:16:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:3306828578791870277 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6466 02-22 00:16:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6467 02-22 00:16:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6468 02-22 00:16:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6469 02-22 00:16:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[646a 02-22 00:16:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[646b 02-22 00:16:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[646c 02-22 00:16:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[646d 02-22 00:16:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[646e 02-22 00:16:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[646f 02-22 00:16:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6470 02-22 00:16:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[6471 02-22 00:16:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[6472 02-22 00:16:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 52 b7 75 5f ee b2 6d c9 15 df d0 dd 07 a2 30 |'R.u_..m.......0|
00000010 4d 5e 39 b2 57 53 64 31 d9 b4 9e 72 83 b7 51 c9 |M^9.WSd1...r..Q.|
[6473 02-22 00:16:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d9 fe ee 80 a7 76 2b af 30 5d |0E.!.......v+.0]|
00000010 df 4d 0c 4d b9 51 ad b4 65 a2 22 55 73 ff c2 f2 |.M.M.Q..e."Us...|
00000020 11 42 32 42 de 02 20 32 9a 65 ff 8b 67 d0 62 1c |.B2B.. 2.e..g.b.|
00000030 be 7e 36 3a 54 ee 32 4e fa ef d2 29 49 2e 5a e3 |.~6:T.2N...)I.Z.|
00000040 dc ae f0 da 5c e1 64 |....\.d|
[6474 02-22 00:16:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[6475 02-22 00:16:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 ae 8c cb ab 62 0f 68 81 81 23 8f |0D. 0....b.h..#.|
00000010 77 3c 62 37 f0 e4 aa c7 25 c0 3a b7 75 c2 cd 13 |w<b7....%.:.u...|
00000020 53 68 47 57 02 20 6f 46 33 0b 97 26 97 52 95 4e |ShGW. oF3..&.R.N|
00000030 eb a7 8e a7 8a c0 22 8a 46 81 60 1e f6 64 88 68 |......".F.`..d.h|
00000040 cb 80 a0 6e d2 09 |...n..|
[6476 02-22 00:16:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6477 02-22 00:16:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[6478 02-22 00:16:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:80
[6479 02-22 00:16:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:80
[647a 02-22 00:16:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[647b 02-22 00:16:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[647c 02-22 00:16:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[647d 02-22 00:16:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[647e 02-22 00:16:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[647f 02-22 00:16:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6480 02-22 00:16:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6481 02-22 00:16:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[6482 02-22 00:16:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[6483 02-22 00:16:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[6484 02-22 00:16:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6485 02-22 00:16:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:1122766829152645675 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6486 02-22 00:16:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1122766829152645675 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6487 02-22 00:16:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[6488 02-22 00:16:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6489 02-22 00:16:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:74070732356880445 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[648a 02-22 00:16:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:74070732356880445 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[648b 02-22 00:16:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:74070732356880445 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[648c 02-22 00:16:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[648d 02-22 00:16:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[648e 02-22 00:16:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[648f 02-22 00:16:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6490 02-22 00:16:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6491 02-22 00:16:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6492 02-22 00:16:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[6493 02-22 00:16:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6494 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[6495 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:11116480535626255253 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[6496 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[6497 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:15829274475124480734 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[6498 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[6499 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:3102052154253563485 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[649a 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:11116480535626255253 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[649b 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:3102052154253563485 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[649c 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[649d 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[649e 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:15829274475124480734 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[649f 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[64a0 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11116480535626255253 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 154 bytes, Signature: 0 bytes
[64a1 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11116480535626255253 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 154 bytes, Signature: 0 bytes
[64a2 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3102052154253563485 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[64a3 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[64a4 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15829274475124480734 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[64a5 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15829274475124480734 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[64a6 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[64a7 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3102052154253563485 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[64a8 02-22 00:16:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3102052154253563485 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[64a9 02-22 00:16:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[64aa 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[64ab 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[64ac 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[64ad 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[64ae 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[64af 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[64b0 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[64b1 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[64b2 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[64b3 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[64b4 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[64b5 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[64b6 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf d9 66 3f b2 16 ea 5a 10 d6 21 85 35 24 2b 75 |..f?...Z..!.5$+u|
00000010 bc 85 f7 30 cd 49 56 08 bb cc cc e2 6c a7 a0 2f |...0.IV.....l../|
[64b7 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 5f 0c 3e 6a 2b f4 d0 7c e8 95 |0E.!.._.>j+..|..|
00000010 c1 d9 af 38 67 d5 79 49 73 78 72 bc 59 20 0e c7 |...8g.yIsxr.Y ..|
00000020 3b 71 62 89 cc 02 20 1f 19 f3 be 24 0f 55 47 d2 |;qb... ....$.UG.|
00000030 d0 e6 78 b3 a9 71 3e 2c e7 4e 3a 02 1a 65 22 d2 |..x..q>,.N:..e".|
00000040 d6 ba a7 8d ea eb 6c |......l|
[64b8 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[64b9 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000268ab0 gate 1582330562455589500 evaluation starts
[64ba 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000268ab0 signed by 0 principal evaluation starts (used [false])
[64bb 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000268ab0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[64bc 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000268ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[64bd 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000268ab0 principal evaluation fails
[64be 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000268ab0 gate 1582330562455589500 evaluation fails
[64bf 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[64c0 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[64c1 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[64c2 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf d9 66 3f b2 16 ea 5a 10 d6 21 85 35 24 2b 75 |..f?...Z..!.5$+u|
00000010 bc 85 f7 30 cd 49 56 08 bb cc cc e2 6c a7 a0 2f |...0.IV.....l../|
[64c3 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 5f 0c 3e 6a 2b f4 d0 7c e8 95 |0E.!.._.>j+..|..|
00000010 c1 d9 af 38 67 d5 79 49 73 78 72 bc 59 20 0e c7 |...8g.yIsxr.Y ..|
00000020 3b 71 62 89 cc 02 20 1f 19 f3 be 24 0f 55 47 d2 |;qb... ....$.UG.|
00000030 d0 e6 78 b3 a9 71 3e 2c e7 4e 3a 02 1a 65 22 d2 |..x..q>,.N:..e".|
00000040 d6 ba a7 8d ea eb 6c |......l|
[64c4 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[64c5 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000269430 gate 1582330562458949300 evaluation starts
[64c6 02-22 00:16:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000269430 signed by 0 principal evaluation starts (used [false])
[64c7 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000269430 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[64c8 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000269430 principal evaluation succeeds for identity 0
[64c9 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000269430 gate 1582330562458949300 evaluation succeeds
[64ca 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[64cb 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[64cc 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[64cd 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[64ce 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes
[64cf 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes]}
[64d0 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:79
[64d1 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:79
[64d2 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[64d3 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[64d4 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[64d5 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[64d6 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[64d7 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[64d8 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[64d9 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[64da 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers
[64db 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[64dc 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[64dd 02-22 00:16:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[64de 02-22 00:16:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15104C
[64df 02-22 00:16:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2095C225F7EA13E798CFE869FC3AA8DD7D060100CAC883D89CE96DFFD2342A53
[64e0 02-22 00:16:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[64e1 02-22 00:16:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[64e2 02-22 00:16:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[64e3 02-22 00:16:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[64e4 02-22 00:16:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[64e5 02-22 00:16:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[64e6 02-22 00:16:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[64e7 02-22 00:16:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[64ea 02-22 00:16:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[64e8 02-22 00:16:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[64eb 02-22 00:16:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[64e9 02-22 00:16:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[64ec 02-22 00:16:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[64ed 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[64ee 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[64ef 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[64f0 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[64f1 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 52 b7 75 5f ee b2 6d c9 15 df d0 dd 07 a2 30 |'R.u_..m.......0|
00000010 4d 5e 39 b2 57 53 64 31 d9 b4 9e 72 83 b7 51 c9 |M^9.WSd1...r..Q.|
[64f2 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d9 fe ee 80 a7 76 2b af 30 5d |0E.!.......v+.0]|
00000010 df 4d 0c 4d b9 51 ad b4 65 a2 22 55 73 ff c2 f2 |.M.M.Q..e."Us...|
00000020 11 42 32 42 de 02 20 32 9a 65 ff 8b 67 d0 62 1c |.B2B.. 2.e..g.b.|
00000030 be 7e 36 3a 54 ee 32 4e fa ef d2 29 49 2e 5a e3 |.~6:T.2N...)I.Z.|
00000040 dc ae f0 da 5c e1 64 |....\.d|
[64f3 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[64f4 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[64f5 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[64f6 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[64f7 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[64f8 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[64f9 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[64fa 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[64fb 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[64fc 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[64fd 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf d9 66 3f b2 16 ea 5a 10 d6 21 85 35 24 2b 75 |..f?...Z..!.5$+u|
00000010 bc 85 f7 30 cd 49 56 08 bb cc cc e2 6c a7 a0 2f |...0.IV.....l../|
[64fe 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 5f 0c 3e 6a 2b f4 d0 7c e8 95 |0E.!.._.>j+..|..|
00000010 c1 d9 af 38 67 d5 79 49 73 78 72 bc 59 20 0e c7 |...8g.yIsxr.Y ..|
00000020 3b 71 62 89 cc 02 20 1f 19 f3 be 24 0f 55 47 d2 |;qb... ....$.UG.|
00000030 d0 e6 78 b3 a9 71 3e 2c e7 4e 3a 02 1a 65 22 d2 |..x..q>,.N:..e".|
00000040 d6 ba a7 8d ea eb 6c |......l|
[64ff 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6500 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002301f0 gate 1582330562567640400 evaluation starts
[6501 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002301f0 signed by 0 principal evaluation starts (used [false])
[6502 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002301f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6503 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002301f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6504 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002301f0 principal evaluation fails
[6505 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002301f0 gate 1582330562567640400 evaluation fails
[6506 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6507 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6508 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6509 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf d9 66 3f b2 16 ea 5a 10 d6 21 85 35 24 2b 75 |..f?...Z..!.5$+u|
00000010 bc 85 f7 30 cd 49 56 08 bb cc cc e2 6c a7 a0 2f |...0.IV.....l../|
[650a 02-22 00:16:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 5f 0c 3e 6a 2b f4 d0 7c e8 95 |0E.!.._.>j+..|..|
00000010 c1 d9 af 38 67 d5 79 49 73 78 72 bc 59 20 0e c7 |...8g.yIsxr.Y ..|
00000020 3b 71 62 89 cc 02 20 1f 19 f3 be 24 0f 55 47 d2 |;qb... ....$.UG.|
00000030 d0 e6 78 b3 a9 71 3e 2c e7 4e 3a 02 1a 65 22 d2 |..x..q>,.N:..e".|
00000040 d6 ba a7 8d ea eb 6c |......l|
[650b 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[650d 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230af0 gate 1582330562571045100 evaluation starts
[650e 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230af0 signed by 0 principal evaluation starts (used [false])
[650c 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[650f 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230af0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6510 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230af0 principal evaluation succeeds for identity 0
[6511 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230af0 gate 1582330562571045100 evaluation succeeds
[6512 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6513 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6514 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6515 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6516 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes
[6517 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6518 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[6519 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 95 c2 25 f7 ea 13 e7 98 cf e8 69 fc 3a a8 dd | ..%.......i.:..|
00000010 7d 06 01 00 ca c8 83 d8 9c e9 6d ff d2 34 2a 53 |}.........m..4*S|
[651a 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b 31 ad 5e 5e d5 4b 67 4c 67 16 cb |0D. +1.^^.KgLg..|
00000010 d1 82 83 51 5b e8 0a 99 f1 b8 a9 23 df 37 38 c2 |...Q[......#.78.|
00000020 b4 4e de 9e 02 20 7a a8 1f 0c 6f f7 e9 4a c9 0f |.N... z...o..J..|
00000030 79 9f 43 a5 0e b2 a1 69 90 9e f2 ee 31 99 df 48 |y.C....i....1..H|
00000040 b7 86 0f d3 b7 cf |......|
[651b 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes
[651c 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes
[651d 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[651e 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[651f 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[6521 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[6520 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6522 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 95 c2 25 f7 ea 13 e7 98 cf e8 69 fc 3a a8 dd | ..%.......i.:..|
00000010 7d 06 01 00 ca c8 83 d8 9c e9 6d ff d2 34 2a 53 |}.........m..4*S|
[6523 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b 31 ad 5e 5e d5 4b 67 4c 67 16 cb |0D. +1.^^.KgLg..|
00000010 d1 82 83 51 5b e8 0a 99 f1 b8 a9 23 df 37 38 c2 |...Q[......#.78.|
00000020 b4 4e de 9e 02 20 7a a8 1f 0c 6f f7 e9 4a c9 0f |.N... z...o..J..|
00000030 79 9f 43 a5 0e b2 a1 69 90 9e f2 ee 31 99 df 48 |y.C....i....1..H|
00000040 b7 86 0f d3 b7 cf |......|
[6524 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[6525 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 2e a5 76 2d 52 14 3e d9 e4 98 76 |0D. V..v-R.>...v|
00000010 99 74 80 32 b7 aa 26 7f 20 89 6b 8e 42 bc 9e 6a |.t.2..&. .k.B..j|
00000020 c6 31 14 f4 02 20 10 45 4b e1 d2 80 3b 63 ce 86 |.1... .EK...;c..|
00000030 a4 fd a8 9a f1 7a ee 1e 06 78 75 c2 5f b9 98 20 |.....z...xu._.. |
00000040 a3 92 69 f6 fa 49 |..i..I|
[6526 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6527 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6528 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6529 02-22 00:16:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[652a 02-22 00:16:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[652b 02-22 00:16:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[652c 02-22 00:16:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[652d 02-22 00:16:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[652e 02-22 00:16:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[652f 02-22 00:16:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 52 b7 75 5f ee b2 6d c9 15 df d0 dd 07 a2 30 |'R.u_..m.......0|
00000010 4d 5e 39 b2 57 53 64 31 d9 b4 9e 72 83 b7 51 c9 |M^9.WSd1...r..Q.|
[6530 02-22 00:16:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d9 fe ee 80 a7 76 2b af 30 5d |0E.!.......v+.0]|
00000010 df 4d 0c 4d b9 51 ad b4 65 a2 22 55 73 ff c2 f2 |.M.M.Q..e."Us...|
00000020 11 42 32 42 de 02 20 32 9a 65 ff 8b 67 d0 62 1c |.B2B.. 2.e..g.b.|
00000030 be 7e 36 3a 54 ee 32 4e fa ef d2 29 49 2e 5a e3 |.~6:T.2N...)I.Z.|
00000040 dc ae f0 da 5c e1 64 |....\.d|
[6531 02-22 00:16:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6532 02-22 00:16:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6533 02-22 00:16:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[6534 02-22 00:16:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 95 c2 25 f7 ea 13 e7 98 cf e8 69 fc 3a a8 dd | ..%.......i.:..|
00000010 7d 06 01 00 ca c8 83 d8 9c e9 6d ff d2 34 2a 53 |}.........m..4*S|
[6535 02-22 00:16:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b 31 ad 5e 5e d5 4b 67 4c 67 16 cb |0D. +1.^^.KgLg..|
00000010 d1 82 83 51 5b e8 0a 99 f1 b8 a9 23 df 37 38 c2 |...Q[......#.78.|
00000020 b4 4e de 9e 02 20 7a a8 1f 0c 6f f7 e9 4a c9 0f |.N... z...o..J..|
00000030 79 9f 43 a5 0e b2 a1 69 90 9e f2 ee 31 99 df 48 |y.C....i....1..H|
00000040 b7 86 0f d3 b7 cf |......|
[6536 02-22 00:16:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes
[6537 02-22 00:16:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:76 , Envelope: 83 bytes, Signature: 70 bytes
[6538 02-22 00:16:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6539 02-22 00:16:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[653a 02-22 00:16:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[653b 02-22 00:16:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[653c 02-22 00:16:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[653d 02-22 00:16:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[653e 02-22 00:16:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[653f 02-22 00:16:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6540 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6541 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6542 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6543 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6544 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6545 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 1e a4 24 a9 9f c9 f4 84 fe 97 80 fe d2 66 cc |7..$..........f.|
00000010 e7 78 9a 2e cd de 8f f1 83 50 1e 3a 4f 5a 1d 0e |.x.......P.:OZ..|
[6546 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e ca f8 da 72 2b f3 39 d9 01 bb 7b |0D. N...r+.9...{|
00000010 08 cc 2a 5a 16 0f db 1c 2d d3 47 cd c9 c7 32 a1 |..*Z....-.G...2.|
00000020 69 39 f2 5d 02 20 13 1c be 48 e6 25 a2 09 b7 6a |i9.]. ...H.%...j|
00000030 a3 fc 25 34 55 9e a7 ef d8 00 4e 61 e6 ff 66 21 |..%4U.....Na..f!|
00000040 90 7e 40 dc 75 f1 |.~@.u.|
[6547 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6548 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000211740 gate 1582330562629272200 evaluation starts
[6549 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000211740 signed by 0 principal evaluation starts (used [false])
[654a 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000211740 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[654b 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000211740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[654c 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000211740 principal evaluation fails
[654d 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000211740 gate 1582330562629272200 evaluation fails
[654e 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[654f 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6550 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6551 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 1e a4 24 a9 9f c9 f4 84 fe 97 80 fe d2 66 cc |7..$..........f.|
00000010 e7 78 9a 2e cd de 8f f1 83 50 1e 3a 4f 5a 1d 0e |.x.......P.:OZ..|
[6552 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e ca f8 da 72 2b f3 39 d9 01 bb 7b |0D. N...r+.9...{|
00000010 08 cc 2a 5a 16 0f db 1c 2d d3 47 cd c9 c7 32 a1 |..*Z....-.G...2.|
00000020 69 39 f2 5d 02 20 13 1c be 48 e6 25 a2 09 b7 6a |i9.]. ...H.%...j|
00000030 a3 fc 25 34 55 9e a7 ef d8 00 4e 61 e6 ff 66 21 |..%4U.....Na..f!|
00000040 90 7e 40 dc 75 f1 |.~@.u.|
[6553 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6554 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c2080 gate 1582330562629801800 evaluation starts
[6555 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c2080 signed by 0 principal evaluation starts (used [false])
[6556 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c2080 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6557 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c2080 principal evaluation succeeds for identity 0
[6558 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c2080 gate 1582330562629801800 evaluation succeeds
[6559 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[655a 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[655b 02-22 00:16:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[655c 02-22 00:16:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[655d 02-22 00:16:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes
[655e 02-22 00:16:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes]}
[655f 02-22 00:16:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:77
[6560 02-22 00:16:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:77
[6561 02-22 00:16:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:76 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[6562 02-22 00:16:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6563 02-22 00:16:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6564 02-22 00:16:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6565 02-22 00:16:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[6566 02-22 00:16:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6567 02-22 00:16:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6568 02-22 00:16:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6569 02-22 00:16:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[656a 02-22 00:16:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[656b 02-22 00:16:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[656c 02-22 00:16:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[656d 02-22 00:16:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[656e 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[656f 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[6570 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[6571 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6572 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[6573 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6574 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[6575 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6576 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 792 bytes, Signature: 0 bytes
[6577 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[6578 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[6579 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[657a 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[657b 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[657c 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[657d 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[657e 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[657f 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6580 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6581 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[6582 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[6583 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6584 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299fec0 gate 1582330562979144300 evaluation starts
[6585 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299fec0 signed by 0 principal evaluation starts (used [false])
[6586 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299fec0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6587 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299fec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6588 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299fec0 principal evaluation fails
[6589 02-22 00:16:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299fec0 gate 1582330562979144300 evaluation fails
[658a 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[658b 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[658c 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[658d 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[658e 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[658f 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6590 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ae8e0 gate 1582330562981081400 evaluation starts
[6591 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ae8e0 signed by 0 principal evaluation starts (used [false])
[6592 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ae8e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6593 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ae8e0 principal evaluation succeeds for identity 0
[6594 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ae8e0 gate 1582330562981081400 evaluation succeeds
[6595 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6596 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6597 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6598 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6599 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[659a 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[659b 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[659c 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[659d 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330560875989700 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:4 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes to 3 peers
[659e 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[659f 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[65a0 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[65a1 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[65a2 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[65a3 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[65a4 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[65a5 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[65a7 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330560875989700 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:4 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[65a8 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[65a9 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65aa 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[65ab 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330560875989700 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:4 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[65ac 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65ad 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[65ae 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a06430 gate 1582330562984076200 evaluation starts
[65af 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a06430 signed by 0 principal evaluation starts (used [false])
[65b0 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a06430 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[65b1 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a06430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[65b2 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a06430 principal evaluation fails
[65b3 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a06430 gate 1582330562984076200 evaluation fails
[65b4 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[65b5 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[65b6 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[65b7 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[65b8 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[65b9 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[65ba 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a06d30 gate 1582330562987069700 evaluation starts
[65bb 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a06d30 signed by 0 principal evaluation starts (used [false])
[65bc 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a06d30 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[65bd 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a06d30 principal evaluation succeeds for identity 0
[65be 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a06d30 gate 1582330562987069700 evaluation succeeds
[65bf 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[65c0 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[65c1 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[65c2 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[65c3 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f c8 1e 04 7b 77 36 a8 6e 4f c6 44 0d 13 da db |....{w6.nO.D....|
00000010 19 f8 b2 d6 19 10 5d 05 54 ba 51 c1 a7 ab f6 71 |......].T.Q....q|
[65c4 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 ca 50 80 6b af 43 44 66 e0 0e ed |0D. D.P.k.CDf...|
00000010 c6 67 cf 8a 93 b5 ac aa 84 4b ae f4 aa 49 44 d0 |.g.......K...ID.|
00000020 ac 4a 23 b9 02 20 29 44 70 73 0b 58 fa 07 ce 08 |.J#.. )Dps.X....|
00000030 8e c1 66 3c 3d dd b2 91 f6 04 b0 38 dc 1e 33 b8 |..f<=......8..3.|
00000040 67 65 8a 46 43 fb |ge.FC.|
[65c5 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[65c6 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[65c7 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[65c8 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[65c9 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[65ca 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f c8 1e 04 7b 77 36 a8 6e 4f c6 44 0d 13 da db |....{w6.nO.D....|
00000010 19 f8 b2 d6 19 10 5d 05 54 ba 51 c1 a7 ab f6 71 |......].T.Q....q|
[65cb 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 ca 50 80 6b af 43 44 66 e0 0e ed |0D. D.P.k.CDf...|
00000010 c6 67 cf 8a 93 b5 ac aa 84 4b ae f4 aa 49 44 d0 |.g.......K...ID.|
00000020 ac 4a 23 b9 02 20 29 44 70 73 0b 58 fa 07 ce 08 |.J#.. )Dps.X....|
00000030 8e c1 66 3c 3d dd b2 91 f6 04 b0 38 dc 1e 33 b8 |..f<=......8..3.|
00000040 67 65 8a 46 43 fb |ge.FC.|
[65cc 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[65cd 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a180c0 gate 1582330562990539800 evaluation starts
[65ce 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a180c0 signed by 0 principal evaluation starts (used [false])
[65cf 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a180c0 processing identity 0 - &{Org1MSP 8be655ba89451b517544b2a241617d188129889401e79f0659d7ccb414b44486}
[65d0 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a180c0 principal evaluation succeeds for identity 0
[65d1 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a180c0 gate 1582330562990539800 evaluation succeeds
[65d2 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[65d3 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[65d4 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[65d5 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[65d6 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65d7 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[65d8 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[65d9 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[65da 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[65db 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[65dc 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[65dd 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[65de 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[65df 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[65e0 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[65e1 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[65e2 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[65e3 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[65e4 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[65e5 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[65e6 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[65e7 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[65a6 02-22 00:16:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330560875989700 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:4 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[65e8 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a32e60 gate 1582330562996072800 evaluation starts
[65e9 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a32e60 signed by 0 principal evaluation starts (used [false])
[65ea 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a32e60 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[65eb 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a32e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[65ec 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a32e60 principal evaluation fails
[65ed 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a32e60 gate 1582330562996072800 evaluation fails
[65ee 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[65ef 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[65f0 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[65f1 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 ed 45 ae fb 8b 95 ce 4d 6b 8c 83 50 8e a6 39 |..E.....Mk..P..9|
00000010 19 fd 20 ac 84 cc ed ed ac fa 8e 80 12 2d c7 a3 |.. ..........-..|
[65f2 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 46 3b 88 19 0a 4f ce 33 fa e0 fe |0D. .F;...O.3...|
00000010 a4 14 64 2a f0 6c 59 f3 f5 fa 93 45 c1 4e 7c 55 |..d*.lY....E.N|U|
00000020 dd d4 23 9f 02 20 26 ad f8 c1 9a bf 95 b1 af 8a |..#.. &.........|
00000030 d0 42 51 13 95 56 0f 7d cd 46 51 23 98 0c 1b f7 |.BQ..V.}.FQ#....|
00000040 66 9f d5 41 ce 70 |f..A.p|
[65f3 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[65f4 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[65f5 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a33780 gate 1582330562996617500 evaluation starts
[65f6 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a33780 signed by 0 principal evaluation starts (used [false])
[65f7 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a33780 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[65f8 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a33780 principal evaluation succeeds for identity 0
[65f9 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a33780 gate 1582330562996617500 evaluation succeeds
[65fa 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[65fb 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[65fc 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[65fd 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[65fe 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[65ff 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6600 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6601 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6602 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6603 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6604 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6605 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6606 02-22 00:16:02.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd fd af fb 04 a4 cb 7a 51 55 a0 27 48 17 4e 2e |.......zQU.'H.N.|
00000010 1a 3b 8e 5b f1 4c 6a c8 30 5f de a3 f1 24 ed a1 |.;.[.Lj.0_...$..|
[6607 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd e5 d8 9d 1d 48 e9 b1 38 3e 96 |0E.!......H..8>.|
00000010 76 20 5d 24 21 60 b4 ad 30 52 30 00 ed e0 5e 06 |v ]$!`..0R0...^.|
00000020 0b e6 7d 03 46 02 20 2e fb 5f 2e 73 a8 5f d2 12 |..}.F. .._.s._..|
00000030 40 f5 2f 08 61 a6 5e e2 93 d3 45 b6 70 40 8b 3e |@./.a.^...E.p@.>|
00000040 95 34 50 76 82 66 58 |.4Pv.fX|
[6608 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6609 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aaf270 gate 1582330563000342500 evaluation starts
[660a 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aaf270 signed by 0 principal evaluation starts (used [false])
[660b 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aaf270 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[660c 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aaf270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[660d 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aaf270 principal evaluation fails
[660e 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aaf270 gate 1582330563000342500 evaluation fails
[660f 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6610 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6611 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6612 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd fd af fb 04 a4 cb 7a 51 55 a0 27 48 17 4e 2e |.......zQU.'H.N.|
00000010 1a 3b 8e 5b f1 4c 6a c8 30 5f de a3 f1 24 ed a1 |.;.[.Lj.0_...$..|
[6613 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd e5 d8 9d 1d 48 e9 b1 38 3e 96 |0E.!......H..8>.|
00000010 76 20 5d 24 21 60 b4 ad 30 52 30 00 ed e0 5e 06 |v ]$!`..0R0...^.|
00000020 0b e6 7d 03 46 02 20 2e fb 5f 2e 73 a8 5f d2 12 |..}.F. .._.s._..|
00000030 40 f5 2f 08 61 a6 5e e2 93 d3 45 b6 70 40 8b 3e |@./.a.^...E.p@.>|
00000040 95 34 50 76 82 66 58 |.4Pv.fX|
[6614 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6615 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aafb70 gate 1582330563001956500 evaluation starts
[6616 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aafb70 signed by 0 principal evaluation starts (used [false])
[6617 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aafb70 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6618 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aafb70 principal evaluation succeeds for identity 0
[6619 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aafb70 gate 1582330563001956500 evaluation succeeds
[661a 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[661b 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[661c 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[661d 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[661e 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[661f 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6620 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6621 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6622 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6623 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6624 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd fd af fb 04 a4 cb 7a 51 55 a0 27 48 17 4e 2e |.......zQU.'H.N.|
00000010 1a 3b 8e 5b f1 4c 6a c8 30 5f de a3 f1 24 ed a1 |.;.[.Lj.0_...$..|
[6625 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd e5 d8 9d 1d 48 e9 b1 38 3e 96 |0E.!......H..8>.|
00000010 76 20 5d 24 21 60 b4 ad 30 52 30 00 ed e0 5e 06 |v ]$!`..0R0...^.|
00000020 0b e6 7d 03 46 02 20 2e fb 5f 2e 73 a8 5f d2 12 |..}.F. .._.s._..|
00000030 40 f5 2f 08 61 a6 5e e2 93 d3 45 b6 70 40 8b 3e |@./.a.^...E.p@.>|
00000040 95 34 50 76 82 66 58 |.4Pv.fX|
[6626 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6627 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae2900 gate 1582330563003666100 evaluation starts
[6628 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae2900 signed by 0 principal evaluation starts (used [false])
[6629 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae2900 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[662a 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae2900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[662b 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae2900 principal evaluation fails
[662c 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae2900 gate 1582330563003666100 evaluation fails
[662d 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[662e 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[662f 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6630 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd fd af fb 04 a4 cb 7a 51 55 a0 27 48 17 4e 2e |.......zQU.'H.N.|
00000010 1a 3b 8e 5b f1 4c 6a c8 30 5f de a3 f1 24 ed a1 |.;.[.Lj.0_...$..|
[6631 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd e5 d8 9d 1d 48 e9 b1 38 3e 96 |0E.!......H..8>.|
00000010 76 20 5d 24 21 60 b4 ad 30 52 30 00 ed e0 5e 06 |v ]$!`..0R0...^.|
00000020 0b e6 7d 03 46 02 20 2e fb 5f 2e 73 a8 5f d2 12 |..}.F. .._.s._..|
00000030 40 f5 2f 08 61 a6 5e e2 93 d3 45 b6 70 40 8b 3e |@./.a.^...E.p@.>|
00000040 95 34 50 76 82 66 58 |.4Pv.fX|
[6632 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6633 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae3210 gate 1582330563004234500 evaluation starts
[6634 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae3210 signed by 0 principal evaluation starts (used [false])
[6635 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae3210 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6636 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae3210 principal evaluation succeeds for identity 0
[6637 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ae3210 gate 1582330563004234500 evaluation succeeds
[6638 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6639 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[663a 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[663b 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[663c 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[663d 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330560875989700 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:4 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[663e 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 79 c8 98 97 88 25 30 b0 91 10 76 62 15 c1 ec 54 |y....%0...vb...T|
00000010 d6 61 5d af b0 cf 3a 0a da 2f 4d 25 67 6c b9 47 |.a]...:../M%gl.G|
[663f 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 be d7 9a 61 46 7c 06 34 7d dc 21 |0D. ....aF|.4}.!|
00000010 7b 2d 5e e8 9f c2 68 f8 35 4c fc 92 06 42 05 d5 |{-^...h.5L...B..|
00000020 7f 36 a4 04 02 20 3f 4d 11 17 dd ce 99 4c 35 6e |.6... ?M.....L5n|
00000030 08 9f 2f 99 f9 37 e6 d5 53 26 d3 54 56 a0 fc 33 |../..7..S&.TV..3|
00000040 5d 08 ff 0a bc 2b |]....+|
[6640 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6641 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6642 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[6643 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 793 bytes, Signature: 0 bytes
[6644 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6645 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 7f d1 ee f8 34 32 5a 2c 2f be a8 04 b1 58 79 |.....42Z,/....Xy|
00000010 c9 3b 84 a7 12 c7 13 48 ca e5 73 dc f3 15 ab 67 |.;.....H..s....g|
[6646 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 2d db 12 d0 15 71 ee 5f 61 0e 35 |0D. .-....q._a.5|
00000010 0c 22 4d 73 7b 88 5e 6e c3 cf b1 58 e9 26 25 7a |."Ms{.^n...X.&%z|
00000020 c8 0a 5d 38 02 20 5d 63 d9 ae 43 08 4b 39 4f c2 |..]8. ]c..C.K9O.|
00000030 58 f9 de 11 2e 99 16 4e 9f 0e c3 48 cd a5 10 80 |X......N...H....|
00000040 ae a0 04 45 4b 33 |...EK3|
[6647 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6648 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6649 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[664a 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[664b 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[664c 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[664d 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[664e 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[664f 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[6650 02-22 00:16:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[6651 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6652 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bccfd0 gate 1582330563010118300 evaluation starts
[6653 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bccfd0 signed by 0 principal evaluation starts (used [false])
[6654 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bccfd0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6655 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bccfd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6656 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bccfd0 principal evaluation fails
[6657 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bccfd0 gate 1582330563010118300 evaluation fails
[6658 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6659 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[665a 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[665b 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 1c 46 9a 15 f6 d1 4e b6 c6 d7 a1 36 2f 61 b2 |..F....N....6/a.|
00000010 68 e1 7b 48 e5 d3 b4 c1 66 e5 53 c0 6a b9 f5 92 |h.{H....f.S.j...|
[665c 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 2c 0b d2 44 78 5d 15 55 d4 54 |0E.!..,..Dx].U.T|
00000010 37 77 59 b3 f4 18 f8 7d db 25 0c 5b 4c fb 44 52 |7wY....}.%.[L.DR|
00000020 ac 2c 95 08 f9 02 20 69 ca 67 25 7a 5f f7 84 a2 |.,.... i.g%z_...|
00000030 5b 4e 46 9c ee 84 2d 02 58 a1 b2 99 9c 6b 6e e8 |[NF...-.X....kn.|
00000040 27 3f dc 6e bd 3c 0b |'?.n.<.|
[665d 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[665e 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd8d0 gate 1582330563010525200 evaluation starts
[665f 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd8d0 signed by 0 principal evaluation starts (used [false])
[6660 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd8d0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6661 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd8d0 principal evaluation succeeds for identity 0
[6662 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd8d0 gate 1582330563010525200 evaluation succeeds
[6663 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6664 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6665 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6666 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6667 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e5 9b e6 a2 d7 13 c9 8b 51 5c e6 51 71 c0 08 |s........Q\.Qq..|
00000010 2a 7f 81 1c 6b 90 ab 9b 0e dc fd 86 60 ed a8 ce |*...k.......`...|
[6668 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 25 8d 74 c6 b7 04 1c be 46 79 |0E.!..%.t.....Fy|
00000010 25 0a 39 3e a0 14 88 15 41 ea 10 fa 9b 08 03 b5 |%.9>....A.......|
00000020 f8 a0 4f 79 a9 02 20 41 7f 1d ba 19 23 65 12 a0 |..Oy.. A....#e..|
00000030 c6 0d 56 58 cd f1 dc 43 65 21 48 0f cc 5c ee 9f |..VX...Ce!H..\..|
00000040 5c 6f a9 9c 7f 5a a2 |\o...Z.|
[6669 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[666a 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[666b 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[666c 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[666d 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[666e 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[666f 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6670 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6671 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 7b 7f 0d 63 23 cc 57 8d ca b9 3a 99 6a d0 23 |.{..c#.W...:.j.#|
00000010 ef df 4a 16 7c cd 10 11 10 09 86 fb f3 3b 6b 9c |..J.|........;k.|
[6672 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 6a 18 aa a3 36 35 f9 ed 65 bb 5b |0D. 3j...65..e.[|
00000010 53 e2 54 9f eb d0 c1 8f 76 c1 4b 60 ac 49 d5 3b |S.T.....v.K`.I.;|
00000020 3b 1d 4e 9f 02 20 47 83 db cd fc fa 1e 8c ca c9 |;.N.. G.........|
00000030 07 82 5e 0b b9 90 c6 ea 95 e9 38 91 16 2a 88 5f |..^.......8..*._|
00000040 2f 57 f6 6e e0 ea |/W.n..|
[6673 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6674 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffdc60 gate 1582330563014107200 evaluation starts
[6675 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffdc60 signed by 0 principal evaluation starts (used [false])
[6676 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffdc60 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6677 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffdc60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6678 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffdc60 principal evaluation fails
[6679 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffdc60 gate 1582330563014107200 evaluation fails
[667a 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[667b 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[667c 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[667d 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 7b 7f 0d 63 23 cc 57 8d ca b9 3a 99 6a d0 23 |.{..c#.W...:.j.#|
00000010 ef df 4a 16 7c cd 10 11 10 09 86 fb f3 3b 6b 9c |..J.|........;k.|
[667e 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 6a 18 aa a3 36 35 f9 ed 65 bb 5b |0D. 3j...65..e.[|
00000010 53 e2 54 9f eb d0 c1 8f 76 c1 4b 60 ac 49 d5 3b |S.T.....v.K`.I.;|
00000020 3b 1d 4e 9f 02 20 47 83 db cd fc fa 1e 8c ca c9 |;.N.. G.........|
00000030 07 82 5e 0b b9 90 c6 ea 95 e9 38 91 16 2a 88 5f |..^.......8..*._|
00000040 2f 57 f6 6e e0 ea |/W.n..|
[667f 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6680 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010a80 gate 1582330563014547500 evaluation starts
[6681 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010a80 signed by 0 principal evaluation starts (used [false])
[6682 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010a80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6683 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010a80 principal evaluation succeeds for identity 0
[6684 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010a80 gate 1582330563014547500 evaluation succeeds
[6685 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6686 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6687 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6688 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6689 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[668a 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[668b 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[668c 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[668d 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[668e 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[668f 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 7b 7f 0d 63 23 cc 57 8d ca b9 3a 99 6a d0 23 |.{..c#.W...:.j.#|
00000010 ef df 4a 16 7c cd 10 11 10 09 86 fb f3 3b 6b 9c |..J.|........;k.|
[6690 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 6a 18 aa a3 36 35 f9 ed 65 bb 5b |0D. 3j...65..e.[|
00000010 53 e2 54 9f eb d0 c1 8f 76 c1 4b 60 ac 49 d5 3b |S.T.....v.K`.I.;|
00000020 3b 1d 4e 9f 02 20 47 83 db cd fc fa 1e 8c ca c9 |;.N.. G.........|
00000030 07 82 5e 0b b9 90 c6 ea 95 e9 38 91 16 2a 88 5f |..^.......8..*._|
00000040 2f 57 f6 6e e0 ea |/W.n..|
[6691 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6692 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003011810 gate 1582330563015163600 evaluation starts
[6693 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003011810 signed by 0 principal evaluation starts (used [false])
[6694 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003011810 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6695 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003011810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6696 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003011810 principal evaluation fails
[6697 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003011810 gate 1582330563015163600 evaluation fails
[6698 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6699 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[669a 02-22 00:16:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[669b 02-22 00:16:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 7b 7f 0d 63 23 cc 57 8d ca b9 3a 99 6a d0 23 |.{..c#.W...:.j.#|
00000010 ef df 4a 16 7c cd 10 11 10 09 86 fb f3 3b 6b 9c |..J.|........;k.|
[669c 02-22 00:16:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 6a 18 aa a3 36 35 f9 ed 65 bb 5b |0D. 3j...65..e.[|
00000010 53 e2 54 9f eb d0 c1 8f 76 c1 4b 60 ac 49 d5 3b |S.T.....v.K`.I.;|
00000020 3b 1d 4e 9f 02 20 47 83 db cd fc fa 1e 8c ca c9 |;.N.. G.........|
00000030 07 82 5e 0b b9 90 c6 ea 95 e9 38 91 16 2a 88 5f |..^.......8..*._|
00000040 2f 57 f6 6e e0 ea |/W.n..|
[669d 02-22 00:16:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[669e 02-22 00:16:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2110 gate 1582330563023136200 evaluation starts
[669f 02-22 00:16:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2110 signed by 0 principal evaluation starts (used [false])
[66a0 02-22 00:16:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2110 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[66a1 02-22 00:16:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2110 principal evaluation succeeds for identity 0
[66a2 02-22 00:16:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2110 gate 1582330563023136200 evaluation succeeds
[66a3 02-22 00:16:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[66a4 02-22 00:16:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[66a5 02-22 00:16:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[66a6 02-22 00:16:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[66a7 02-22 00:16:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[66a8 02-22 00:16:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[66a9 02-22 00:16:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[66aa 02-22 00:16:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[66ab 02-22 00:16:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[66ac 02-22 00:16:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[66ad 02-22 00:16:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:18395257684439548830 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[66ae 02-22 00:16:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:18395257684439548830 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[66af 02-22 00:16:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[66b0 02-22 00:16:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18395257684439548830 , Msg_type: BLOCK_MSG, digests: [1 2 3], Envelope: 43 bytes, Signature: 0 bytes
[66b1 02-22 00:16:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18395257684439548830 , Msg_type: BLOCK_MSG, digests: [1 2 3], Envelope: 43 bytes, Signature: 0 bytes
[66b2 02-22 00:16:03.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[66b3 02-22 00:16:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s
[66b4 02-22 00:16:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[66b5 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[66b6 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[66b7 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[66b8 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[66b9 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 5f 4d 9b 44 be 5e 5f 57 41 d0 6a 09 8d 5b e9 |~_M.D.^_WA.j..[.|
00000010 51 ee fc bb ef d8 92 c0 d2 3a 4d 24 ec 0e 7a 87 |Q........:M$..z.|
[66ba 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f ef 8f dd b2 c8 ff 58 04 a4 fe ae |0D. .......X....|
00000010 40 c2 c6 ac 7a f6 9e 15 af 1d 2a cd cb 87 0c aa |@...z.....*.....|
00000020 42 6d 14 1a 02 20 5b a0 b7 51 a2 1e f8 9e 09 28 |Bm... [..Q.....(|
00000030 cc cc a9 70 63 3e 6a 13 dd cf 16 e9 af 10 7a 65 |...pc>j.......ze|
00000040 33 d8 5d 4d 11 e3 |3.]M..|
[66bb 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[66bc 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c3290 gate 1582330563361764300 evaluation starts
[66bd 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c3290 signed by 0 principal evaluation starts (used [false])
[66be 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c3290 processing identity 0 - &{OrdererMSP 9de2412befbda85787d990eb15cf69142545cfd8abf27ca5a151a46e885ec6cd}
[66bf 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c3290 principal evaluation succeeds for identity 0
[66c0 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c3290 gate 1582330563361764300 evaluation succeeds
[66c1 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[66c2 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[66c3 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[66c4 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[66c5 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [4] channel=businesschannel
[66c6 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4]
[66c7 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks
[66c9 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [4] channel=businesschannel
[66c8 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4]
[66ca 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger
[66cb 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer
[66cc 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4]
[66cd 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4]
[66ce 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[66cf 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0034fa8c0 env 0xc002b16aa0 txn 0
[66d0 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002b16aa0
[66d1 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\301\345\301\362\005\020\364\231\374\206\001\"\017businesschannel*@2b596bbe9185eb53180d03ce14085e7bdc892b4d60e4764b0616a88b70f0ba5f:\016\022\014\022\n_lifecycle" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\npnWuUMQ+CNf2XrYWYElLritc4lD3dQVBqCL4zeo=\n-----END CERTIFICATE-----\n\022\030a\320Z:\276S\007\007\355r\006\267\263p\004 \2611\347\2341st\312"
[66d2 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3
[66d3 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[66d4 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[66d5 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[66d6 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[66d7 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 44c87d6d29f5a901134fda071a7edf7126a7788becd3944cea03a9d24174d773}
[66d8 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[66d9 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[66da 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[66db 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 74 b4 ba 63 7a db de e2 7d c5 cd 13 ed a8 80 |nt..cz...}......|
00000010 9b 56 cc ce 13 40 84 e1 9a bd c7 d1 de 5b aa 2f |.V...@.......[./|
[66dc 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 0f 8a df 18 3d 32 7d 84 6b e9 |0E.!......=2}.k.|
00000010 73 57 d5 8c 7d 93 9f 69 dc cd 3c 4d 16 e3 e8 0d |sW..}..i..<M....|
00000020 83 ad d3 e6 38 02 20 15 a6 1a ee e1 fb 93 54 4d |....8. .......TM|
00000030 aa 59 e9 e1 be 3b 70 90 0a 3d 0d 8e 66 25 47 f8 |.Y...;p..=..f%G.|
00000040 41 79 f5 7d b6 b4 4e |Ay.}..N|
[66dd 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[66de 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc003442400, header channel_header:"\010\003\032\014\010\301\345\301\362\005\020\364\231\374\206\001\"\017businesschannel*@2b596bbe9185eb53180d03ce14085e7bdc892b4d60e4764b0616a88b70f0ba5f:\016\022\014\022\n_lifecycle" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQO/PWArm1t3i/tKeMC7OVzzAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABOsthMItxOiQ\n2q8uaam4VvMJ2YsES2AMAJVbuRngSjcnRXBB9Xza2SdB60ycofngoZDYiY2Tro2+\nXDkmSSgHBoijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIFXg282MUjb2oOUasFo56uMuXM4YvgWMtT2OrWxN45eVMAoGCCqGSM49\nBAMCA0gAMEUCIQC9yOVdG0wK+yXEeZefUKHHoN0hrMgrJ/d4y5a2RRIx6AIgXhwg\npnWuUMQ+CNf2XrYWYElLritc4lD3dQVBqCL4zeo=\n-----END CERTIFICATE-----\n\022\030a\320Z:\276S\007\007\355r\006\267\263p\004 \2611\347\2341st\312"
[66df 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions
[66e0 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid
[66e1 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s(<nil>)
[66e2 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[66e3 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [2b596bbe9185eb53180d03ce14085e7bdc892b4d60e4764b0616a88b70f0ba5f]
[66e4 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x32, 0x62, 0x35, 0x39, 0x36, 0x62, 0x62, 0x65, 0x39, 0x31, 0x38, 0x35, 0x65, 0x62, 0x35, 0x33, 0x31, 0x38, 0x30, 0x64, 0x30, 0x33, 0x63, 0x65, 0x31, 0x34, 0x30, 0x38, 0x35, 0x65, 0x37, 0x62, 0x64, 0x63, 0x38, 0x39, 0x32, 0x62, 0x34, 0x64, 0x36, 0x30, 0x65, 0x34, 0x37, 0x36, 0x34, 0x62, 0x30, 0x36, 0x31, 0x36, 0x61, 0x38, 0x38, 0x62, 0x37, 0x30, 0x66, 0x30, 0x62, 0x61, 0x35, 0x66}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x32, 0x62, 0x35, 0x39, 0x36, 0x62, 0x62, 0x65, 0x39, 0x31, 0x38, 0x35, 0x65, 0x62, 0x35, 0x33, 0x31, 0x38, 0x30, 0x64, 0x30, 0x33, 0x63, 0x65, 0x31, 0x34, 0x30, 0x38, 0x35, 0x65, 0x37, 0x62, 0x64, 0x63, 0x38, 0x39, 0x32, 0x62, 0x34, 0x64, 0x36, 0x30, 0x65, 0x34, 0x37, 0x36, 0x34, 0x62, 0x30, 0x36, 0x31, 0x36, 0x61, 0x38, 0x38, 0x62, 0x37, 0x30, 0x66, 0x30, 0x62, 0x61, 0x35, 0x66, 0xff}]
[66e5 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction with plugins
[66e6 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch starts for bytes 0xc002f3d000
[66e7 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [959b2750-1afe-4539-9c99-4cb809dc02d2]
[66e8 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [959b2750-1afe-4539-9c99-4cb809dc02d2]
[66e9 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 2b596bbe9185eb53180d03ce14085e7bdc892b4d60e4764b0616a88b70f0ba5f, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin
[66ea 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [24890341-9661-44d3-967a-a1ea1d9ce313]
[66eb 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[66ec 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > maximum_peer_count:1 > > ]
[66ed 02-22 00:16:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [24890341-9661-44d3-967a-a1ea1d9ce313]
[66ee 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [6793c424-c464-4a05-a511-2410e450ccfd]
[66ef 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [6793c424-c464-4a05-a511-2410e450ccfd]
[66f0 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement ==
[66f1 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a 75 bb bb cf 8e 35 4b 06 5a 19 6a 06 f7 f5 98 |.u....5K.Z.j....|
00000010 d0 c0 0b 71 41 95 b4 21 ca 03 f5 21 55 93 c6 69 |...qA..!...!U..i|
[66f2 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad 10 39 a3 0c 5a 48 59 b3 ba dc |0E.!...9..ZHY...|
00000010 dd a4 51 ff ed 38 a1 3d 99 63 06 a1 a1 7a 24 bc |..Q..8.=.c...z$.|
00000020 5e 95 b6 38 d9 02 20 6d 96 b2 8c ef 31 79 e1 f7 |^..8.. m....1y..|
00000030 03 d6 aa 12 55 b0 6a 5c ee 99 c1 18 18 5d ef ec |....U.j\.....]..|
00000040 c5 c3 46 1d 6d 23 4e |..F.m#N|
[66f3 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[66f4 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052b8570 gate 1582330563383387500 evaluation starts
[66f5 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052b8570 signed by 0 principal evaluation starts (used [false])
[66f6 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052b8570 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[66f7 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052b8570 principal evaluation succeeds for identity 0
[66f8 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052b8570 gate 1582330563383387500 evaluation succeeds
[66f9 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement
[66fa 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement
[66fb 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [295d8f2b-74a8-47f6-93a1-d0e3f933337e]
[66fc 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[66fd 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > maximum_peer_count:1 > > ]
[66fe 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [295d8f2b-74a8-47f6-93a1-d0e3f933337e]
[66ff 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [bfe2c07e-dae9-47e9-88be-294a0d2a3ca7]
[6700 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[6701 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > maximum_peer_count:1 > > ]
[6702 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [bfe2c07e-dae9-47e9-88be-294a0d2a3ca7]
[6703 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [68b3db4b-bfd7-4856-a517-2a467cbfb1cb]
[6704 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[6705 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > maximum_peer_count:1 > > ]
[6706 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [68b3db4b-bfd7-4856-a517-2a467cbfb1cb]
[6707 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [084c98bc-1587-47da-99c1-b5c90e9170ee]
[6708 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[6709 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > maximum_peer_count:1 > > config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > ]
[670a 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [084c98bc-1587-47da-99c1-b5c90e9170ee]
[670b 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [7c7203f7-c8df-4965-a0c0-5e98482c5bf1]
[670c 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[670d 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > maximum_peer_count:1 > > ]
[670e 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7c7203f7-c8df-4965-a0c0-5e98482c5bf1]
[670f 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: _lifecycle, tx 0 validation results is: <nil>
[6710 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 2b596bbe9185eb53180d03ce14085e7bdc892b4d60e4764b0616a88b70f0ba5f appears to be valid
[6711 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch completes env bytes 0xc002f3d000
[6712 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0034fa8c0 env 0xc002b16aa0 txn 0
[6713 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[6714 02-22 00:16:03.38 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 17ms
[6715 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4bcf0230-faee-48ea-ba42-be0f1dd1d8d0]
[6716 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4bcf0230-faee-48ea-ba42-be0f1dd1d8d0]
[6717 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[6718 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 68 7a ad f8 62 bd 77 6c 8f c1 8b 8e 9f 8e 20 |fhz..b.wl...... |
00000010 08 97 14 85 6e e2 33 b3 90 2a 59 1d 0d 5f 29 25 |....n.3..*Y.._)%|
[6719 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 de 83 42 9c 50 b0 3f 43 d0 83 |0E.!....B.P.?C..|
00000010 66 d3 60 ab 0c 27 44 78 1d eb f7 1b df 59 11 64 |f.`..'Dx.....Y.d|
00000020 c0 0a ac 4f 29 02 20 07 9b 47 a5 a2 90 63 6c 5e |...O). ..G...cl^|
00000030 74 f3 bc f9 0a 28 4e ae a7 1d b2 75 af f7 0a 80 |t....(N....u....|
00000040 c7 8a d0 e9 6e 2d 26 |....n-&|
[671a 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[671b 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005392530 gate 1582330563393235500 evaluation starts
[671c 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005392530 signed by 0 principal evaluation starts (used [false])
[671d 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005392530 processing identity 0 - &{Org1MSP 7d0df2506ac221e9752cec5e841f5c7482dfa0c77748a65771953394012282dd}
[671e 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005392530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)
[671f 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005392530 principal evaluation fails
[6720 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005392530 gate 1582330563393235500 evaluation fails
[6721 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Peer is not eligible for collection: chaincode [_lifecycle], collection name [_implicit_org_Org2MSP], txID [2b596bbe9185eb53180d03ce14085e7bdc892b4d60e4764b0616a88b70f0ba5f] the policy is [&privdata.SimpleCollection{name:"_implicit_org_Org2MSP", accessPolicy:(*cauthdsl.policy)(0xc005015200), memberOrgs:[]string{"Org2MSP"}, conf:peer.StaticCollectionConfig{Name:"_implicit_org_Org2MSP", MemberOrgsPolicy:(*peer.CollectionPolicyConfig)(0xc002d61170), RequiredPeerCount:0, MaximumPeerCount:1, BlockToLive:0x0, MemberOnlyRead:false, MemberOnlyWrite:false, EndorsementPolicy:(*peer.ApplicationPolicy)(nil), XXX_NoUnkeyedLiteral:struct {}{}, XXX_unrecognized:[]uint8(nil), XXX_sizecache:0}}]. Skipping. channel=businesschannel
[6722 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 0 private write sets from cache. channel=businesschannel
[6723 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from transient store channel=businesschannel
[6724 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [4] channel=businesschannel
[6725 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4]
[6726 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[6727 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[6728 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[6729 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4]
[672a 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[672b 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION
[672c 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[672d 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[672e 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[672f 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/metadata/exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[6730 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'
[6731 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[6732 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02
[6733 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[6734 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [2b596bbe9185eb53180d03ce14085e7bdc892b4d60e4764b0616a88b70f0ba5f] marked as valid by state validator. ContainsPostOrderWrites [false]
[6735 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc00326ed40), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xa5\xfe\x94\xf5>{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc00326ee00), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc00326ecc0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc00326ed00), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4<k\xbe\x06\f\xfcG4\x15\xdc\xc8\x17\xa4ψ\xe6\x8a\xc9.ܿ"}:(*internal.keyOps)(0xc00326edc0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xf6\xdc\xd0h\x9a-\xbb\x81\xcei\x88u\xd7E\x85\xf3\xdf\xf1^\xb0\x06kꞐ\x9d\x80\x95\x85\xcc\x13\xa9"}:(*internal.keyOps)(0xc00326ed80)}
[6736 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[6737 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[6738 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[6739 02-22 00:16:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4754 bytes, seq: 4}, Envelope: 4784 bytes, Signature: 0 bytes to the block puller
[673a 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4
[673b 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6F121408ACB284A6AEA4E4FA15...0F0A0A5F6C6966656379636C65120131
[673c 02-22 00:16:03.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3F5561B79FF846F9763060D60D20EF4D9C2830742C2D58E9FCE93A82F4A2BC89
[673d 02-22 00:16:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0xc0003d21a0 0xc00034c080 0xc0003451b0 0xc0002704f0}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[xb<78><62><07><>|T)sIO<49><4F>7<<3C><><EFBFBD>J<EFBFBD>H<19><><EFBFBD><EFBFBD><14>:%!s(*lifecycle.LocalChaincode=&{0xc003170600 map[]})] %!s(*lifecycle.EventBroker=&{0xc00034c080 0xc0002cdb20 0xc0003451b0 0xc0002cf170 {0 0} map[]}) %!s(*lifecycle.MetadataManager=&{{0 0} [0x15fb690] map[businesschannel:[]] map[businesschannel:[{_lifecycle 1 [18 41 47 67 104 97 110 110 101 108 47 65 112 112 108 105 99 97 116 105 111 110 47 76 105 102 101 99 121 99 108 101 69 110 100 111 114 115 101 109 101 110 116] [] <nil> true true}]]}) %!s(*lifecycle.ChaincodeCustodian=&{0xc000340e80 {0 0} [] false})}
[673e 02-22 00:16:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}
[673f 02-22 00:16:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6740 02-22 00:16:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6741 02-22 00:16:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6742 02-22 00:16:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6743 02-22 00:16:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4754 bytes, seq: 4}, Envelope: 4784 bytes, Signature: 0 bytes to 1 peers
[6744 02-22 00:16:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6745 02-22 00:16:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6746 02-22 00:16:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4754 bytes, seq: 4}, Envelope: 4784 bytes, Signature: 0 bytes
[6747 02-22 00:16:03.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6748 02-22 00:16:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]
[6749 02-22 00:16:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000340e40 0x2670c08})}
[674a 02-22 00:16:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000340e40 0x2670c08}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 81 73 77 50 111 117 57 68 113 102 118 107 75 116 105 85 79 90 72 107 108 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 69 121 77 106 103 119 77 68 85 120 77 68 66 97 70 119 48 121 79 84 69 121 77 106 85 119 77 68 85 120 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 73 57 118 88 79 50 100 103 50 111 103 70 10 57 71 55 78 107 116 101 97 74 97 112 121 83 85 54 55 49 82 105 75 99 73 110 78 118 51 79 65 100 73 114 43 120 115 110 49 49 87 102 55 84 77 54 57 52 79 119 55 47 71 87 115 71 85 55 49 111 90 84 90 98 72 102 119 10 105 53 83 102 75 108 97 98 77 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 48 121 52 86 118 99 90 67 76 100 83 112 108 97 104 79 71 75 84 48 53 104 99 74 105 82 85 101 111 113 86 109 69 81 104 87 98 43 112 55 121 78 69 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 72 116 97 113 104 114 57 47 98 120 105 103 67 121 104 117 75 113 89 113 68 122 116 119 51 117 69 49 49 113 117 73 90 55 100 114 107 97 89 47 109 118 81 67 73 71 86 116 105 112 108 43 10 79 56 86 121 56 52 117 108 84 82 108 118 116 97 102 68 53 101 86 74 117 113 54 73 114 80 57 66 114 111 70 120 117 49 68 74 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 179 183 184 118 70 59 160 172 8 127 94 65 226 212 86 227 28 96 8 133 49 250 55 11 53 150 142 239 86 215 172 210 2 32 100 89 81 91 46 235 16 150 255 121 87 170 193 209 185 37 14 142 30 237 8 252 234 108 47 230 40 153 117 116 137 125]} 0x15fb3f0}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc000277da0 0xc000419960 {{0 0} 0 0 0 0} {false}})]}
[674b 02-22 00:16:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000340e40 0x2670c08}) %!s(*confighistory.dbProvider=&{0xc0008fcee0})}
[674c 02-22 00:16:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4]
[674d 02-22 00:16:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage
[674e 02-22 00:16:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store
[674f 02-22 00:16:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [996eca11-3612-45f5-a090-12904bf261f4]
[6750 02-22 00:16:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [996eca11-3612-45f5-a090-12904bf261f4]
[6751 02-22 00:16:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4]
[6752 02-22 00:16:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4]
[6753 02-22 00:16:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0xea, 0xcf, 0x1, 0x53, 0x74, 0xc3, 0x1b, 0x1, 0xae, 0x66, 0x4c, 0x37, 0xfb, 0xb0, 0x54, 0x86, 0x30, 0x32, 0xf6, 0x4b, 0x80, 0x3a, 0xa0, 0xcb, 0xe, 0x14, 0x7d, 0x57, 0x4c, 0x94, 0x20, 0x6a} txOffsets=
txId=2b596bbe9185eb53180d03ce14085e7bdc892b4d60e4764b0616a88b70f0ba5f locPointer=offset=70, bytesLength=3745
]
[6754 02-22 00:16:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=82977, bytesLength=3745] for tx ID: [2b596bbe9185eb53180d03ce14085e7bdc892b4d60e4764b0616a88b70f0ba5f] to txid-index
[6755 02-22 00:16:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=82977, bytesLength=3745] for tx number:[0] ID: [2b596bbe9185eb53180d03ce14085e7bdc892b4d60e4764b0616a88b70f0ba5f] to blockNumTranNum index
[6756 02-22 00:16:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[87683], isChainEmpty=[false], lastBlockNumber=[4]
[6757 02-22 00:16:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database
[6758 02-22 00:16:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[6759 02-22 00:16:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[675a 02-22 00:16:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[675b 02-22 00:16:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]
[675c 02-22 00:16:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]
[675d 02-22 00:16:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]
[675e 02-22 00:16:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]
[675f 02-22 00:16:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]
[6760 02-22 00:16:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]
[6761 02-22 00:16:03.45 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[6762 02-22 00:16:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org2MSP4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]
[6763 02-22 00:16:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org2MSP<00><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]
[6764 02-22 00:16:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org2MSP<00><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xe5, 0x92, 0x1f, 0x81, 0x52, 0xdf, 0xf6, 0x8c, 0x18, 0x6c, 0xa4, 0x3c, 0x6b, 0xbe, 0x6, 0xc, 0xfc, 0x47, 0x34, 0x15, 0xdc, 0xc8, 0x17, 0xa4, 0xcf, 0x88, 0xe6, 0x8a, 0xc9, 0x2e, 0xdc, 0xbf}]
[6765 02-22 00:16:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org2MSP<00><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]
<EFBFBD><EFBFBD><EFBFBD>Ժ<EFBFBD>] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]
[6767 02-22 00:16:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecycle$$h_implicit_org_Org2MSP<00><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]
[6768 02-22 00:16:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[6769 02-22 00:16:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5]
[676a 02-22 00:16:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}]
[676b 02-22 00:16:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[676c 02-22 00:16:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database
[676d 02-22 00:16:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions
[676e 02-22 00:16:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5]
[676f 02-22 00:16:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4]
[6770 02-22 00:16:03.46 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 74ms (state_validation=32ms block_and_pvtdata_commit=25ms state_commit=14ms) commitHash=[29e4c2005af539cc23f14625e9917651000cd138fae4df23e6ea0b5071ab48b8]
[6771 02-22 00:16:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6F121408ACB284A6AEA4E4FA15...0F0A0A5F6C6966656379636C65120131
[6772 02-22 00:16:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B04DAE286CCB07C19A42A12BFE2C9E8D147F18BA014D3A364707C720207D73D2
[6773 02-22 00:16:03.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s)
[6774 02-22 00:16:03.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[6775 02-22 00:16:03.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6776 02-22 00:16:03.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6777 02-22 00:16:03.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6778 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330563488577200 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[6779 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 d6 8a ef 72 7d 47 02 62 6d 3e 40 40 ba 9b 26 |....r}G.bm>@@..&|
00000010 c3 c6 b8 f9 ce 94 c5 f1 69 81 3c e4 a6 a4 49 a3 |........i.<...I.|
[677a 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 cf 46 28 24 f3 a3 31 76 a2 ac 0d |0D. y.F($..1v...|
00000010 e5 73 6b cd 20 b5 ce b3 4b a7 f0 17 c6 be d4 9b |.sk. ...K.......|
00000020 77 27 09 d7 02 20 17 f2 22 9a d0 1c 40 6e 42 3d |w'... .."...@nB=|
00000030 61 75 74 a9 44 c7 4d b9 35 09 ec 82 6e 41 6e 2a |aut.D.M.5...nAn*|
00000040 ae b0 2a 7a f4 02 |..*z..|
[677b 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[677c 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[677d 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[677e 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[677f 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6780 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 d6 8a ef 72 7d 47 02 62 6d 3e 40 40 ba 9b 26 |....r}G.bm>@@..&|
00000010 c3 c6 b8 f9 ce 94 c5 f1 69 81 3c e4 a6 a4 49 a3 |........i.<...I.|
[6781 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 cf 46 28 24 f3 a3 31 76 a2 ac 0d |0D. y.F($..1v...|
00000010 e5 73 6b cd 20 b5 ce b3 4b a7 f0 17 c6 be d4 9b |.sk. ...K.......|
00000020 77 27 09 d7 02 20 17 f2 22 9a d0 1c 40 6e 42 3d |w'... .."...@nB=|
00000030 61 75 74 a9 44 c7 4d b9 35 09 ec 82 6e 41 6e 2a |aut.D.M.5...nAn*|
00000040 ae b0 2a 7a f4 02 |..*z..|
[6782 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6783 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547c1e0 gate 1582330563557624900 evaluation starts
[6784 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547c1e0 signed by 0 principal evaluation starts (used [false])
[6785 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547c1e0 processing identity 0 - &{Org1MSP 8be655ba89451b517544b2a241617d188129889401e79f0659d7ccb414b44486}
[6786 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547c1e0 principal evaluation succeeds for identity 0
[6787 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00547c1e0 gate 1582330563557624900 evaluation succeeds
[6788 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[6789 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[678a 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[678b 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[678c 02-22 00:16:03.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[678d 02-22 00:16:03.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330563488577200 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[678e 02-22 00:16:03.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 d6 8a ef 72 7d 47 02 62 6d 3e 40 40 ba 9b 26 |....r}G.bm>@@..&|
00000010 c3 c6 b8 f9 ce 94 c5 f1 69 81 3c e4 a6 a4 49 a3 |........i.<...I.|
[678f 02-22 00:16:03.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 cf 46 28 24 f3 a3 31 76 a2 ac 0d |0D. y.F($..1v...|
00000010 e5 73 6b cd 20 b5 ce b3 4b a7 f0 17 c6 be d4 9b |.sk. ...K.......|
00000020 77 27 09 d7 02 20 17 f2 22 9a d0 1c 40 6e 42 3d |w'... .."...@nB=|
00000030 61 75 74 a9 44 c7 4d b9 35 09 ec 82 6e 41 6e 2a |aut.D.M.5...nAn*|
00000040 ae b0 2a 7a f4 02 |..*z..|
[6790 02-22 00:16:03.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6791 02-22 00:16:03.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6792 02-22 00:16:03.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6793 02-22 00:16:03.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6794 02-22 00:16:03.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330563488577200 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes to 2 peers
[6795 02-22 00:16:03.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6796 02-22 00:16:03.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6797 02-22 00:16:03.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330563488577200 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[6798 02-22 00:16:03.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6799 02-22 00:16:03.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330563488577200 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[679a 02-22 00:16:03.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[679b 02-22 00:16:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330563488577200 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[679c 02-22 00:16:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330563488577200 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[679d 02-22 00:16:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 d6 8a ef 72 7d 47 02 62 6d 3e 40 40 ba 9b 26 |....r}G.bm>@@..&|
00000010 c3 c6 b8 f9 ce 94 c5 f1 69 81 3c e4 a6 a4 49 a3 |........i.<...I.|
[679e 02-22 00:16:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 cf 46 28 24 f3 a3 31 76 a2 ac 0d |0D. y.F($..1v...|
00000010 e5 73 6b cd 20 b5 ce b3 4b a7 f0 17 c6 be d4 9b |.sk. ...K.......|
00000020 77 27 09 d7 02 20 17 f2 22 9a d0 1c 40 6e 42 3d |w'... .."...@nB=|
00000030 61 75 74 a9 44 c7 4d b9 35 09 ec 82 6e 41 6e 2a |aut.D.M.5...nAn*|
00000040 ae b0 2a 7a f4 02 |..*z..|
[679f 02-22 00:16:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67a0 02-22 00:16:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[67a1 02-22 00:16:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9048351847010480042 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[67a2 02-22 00:16:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9048351847010480042 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[67a3 02-22 00:16:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[67a4 02-22 00:16:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[67a5 02-22 00:16:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[67a6 02-22 00:16:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67a7 02-22 00:16:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67a8 02-22 00:16:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67a9 02-22 00:16:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[67aa 02-22 00:16:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330563497791100 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 71 bytes
[67ab 02-22 00:16:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67ac 02-22 00:16:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[67ad 02-22 00:16:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[67ae 02-22 00:16:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[67af 02-22 00:16:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[67b0 02-22 00:16:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[67b1 02-22 00:16:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[67b2 02-22 00:16:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 bd 92 4c a0 8e a3 7a 84 1b b5 cb 6a 4c ff 5f |E..L...z....jL._|
00000010 95 a1 75 21 1d 68 4c 8f aa 31 f9 b2 0f 0b fa fd |..u!.hL..1......|
[67b3 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 78 01 37 59 83 57 f3 09 69 17 |0E.!..x.7Y.W..i.|
00000010 0c 84 f5 64 b0 3d 84 9c d7 fe e2 f6 9b e2 5d 66 |...d.=........]f|
00000020 e6 7d bc 46 82 02 20 35 a7 2b f8 71 93 b4 90 01 |.}.F.. 5.+.q....|
00000030 15 bc d3 e8 55 be 8c ef 36 ef a5 3b 5b 6e 36 78 |....U...6..;[n6x|
00000040 c4 bd cc d1 92 fa 2e |.......|
[67b4 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[67b5 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054ff820 gate 1582330563912254800 evaluation starts
[67b6 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054ff820 signed by 0 principal evaluation starts (used [false])
[67b7 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054ff820 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[67b8 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054ff820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[67b9 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054ff820 principal evaluation fails
[67ba 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054ff820 gate 1582330563912254800 evaluation fails
[67bb 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[67bc 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[67bd 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[67be 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 bd 92 4c a0 8e a3 7a 84 1b b5 cb 6a 4c ff 5f |E..L...z....jL._|
00000010 95 a1 75 21 1d 68 4c 8f aa 31 f9 b2 0f 0b fa fd |..u!.hL..1......|
[67bf 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 78 01 37 59 83 57 f3 09 69 17 |0E.!..x.7Y.W..i.|
00000010 0c 84 f5 64 b0 3d 84 9c d7 fe e2 f6 9b e2 5d 66 |...d.=........]f|
00000020 e6 7d bc 46 82 02 20 35 a7 2b f8 71 93 b4 90 01 |.}.F.. 5.+.q....|
00000030 15 bc d3 e8 55 be 8c ef 36 ef a5 3b 5b 6e 36 78 |....U...6..;[n6x|
00000040 c4 bd cc d1 92 fa 2e |.......|
[67c0 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[67c1 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffe120 gate 1582330563917610200 evaluation starts
[67c2 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffe120 signed by 0 principal evaluation starts (used [false])
[67c3 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffe120 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[67c4 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffe120 principal evaluation succeeds for identity 0
[67c5 02-22 00:16:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffe120 gate 1582330563917610200 evaluation succeeds
[67c6 02-22 00:16:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[67c7 02-22 00:16:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[67c8 02-22 00:16:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[67c9 02-22 00:16:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[67ca 02-22 00:16:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67cb 02-22 00:16:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67cc 02-22 00:16:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[67cd 02-22 00:16:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[67ce 02-22 00:16:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[67cf 02-22 00:16:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[67d0 02-22 00:16:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[67d1 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 bd 92 4c a0 8e a3 7a 84 1b b5 cb 6a 4c ff 5f |E..L...z....jL._|
00000010 95 a1 75 21 1d 68 4c 8f aa 31 f9 b2 0f 0b fa fd |..u!.hL..1......|
[67d2 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 78 01 37 59 83 57 f3 09 69 17 |0E.!..x.7Y.W..i.|
00000010 0c 84 f5 64 b0 3d 84 9c d7 fe e2 f6 9b e2 5d 66 |...d.=........]f|
00000020 e6 7d bc 46 82 02 20 35 a7 2b f8 71 93 b4 90 01 |.}.F.. 5.+.q....|
00000030 15 bc d3 e8 55 be 8c ef 36 ef a5 3b 5b 6e 36 78 |....U...6..;[n6x|
00000040 c4 bd cc d1 92 fa 2e |.......|
[67d3 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[67d4 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffef80 gate 1582330563930184500 evaluation starts
[67d5 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffef80 signed by 0 principal evaluation starts (used [false])
[67d6 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffef80 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[67d7 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffef80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[67d8 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffef80 principal evaluation fails
[67d9 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffef80 gate 1582330563930184500 evaluation fails
[67da 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[67db 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[67dc 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[67dd 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 bd 92 4c a0 8e a3 7a 84 1b b5 cb 6a 4c ff 5f |E..L...z....jL._|
00000010 95 a1 75 21 1d 68 4c 8f aa 31 f9 b2 0f 0b fa fd |..u!.hL..1......|
[67de 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 78 01 37 59 83 57 f3 09 69 17 |0E.!..x.7Y.W..i.|
00000010 0c 84 f5 64 b0 3d 84 9c d7 fe e2 f6 9b e2 5d 66 |...d.=........]f|
00000020 e6 7d bc 46 82 02 20 35 a7 2b f8 71 93 b4 90 01 |.}.F.. 5.+.q....|
00000030 15 bc d3 e8 55 be 8c ef 36 ef a5 3b 5b 6e 36 78 |....U...6..;[n6x|
00000040 c4 bd cc d1 92 fa 2e |.......|
[67df 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[67e0 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fff880 gate 1582330563930784600 evaluation starts
[67e1 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fff880 signed by 0 principal evaluation starts (used [false])
[67e2 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fff880 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[67e3 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fff880 principal evaluation succeeds for identity 0
[67e4 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fff880 gate 1582330563930784600 evaluation succeeds
[67e5 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[67e6 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[67e7 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[67e8 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[67e9 02-22 00:16:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[67ea 02-22 00:16:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330563497791100 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 71 bytes
[67eb 02-22 00:16:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330563497791100 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 71 bytes
[67ec 02-22 00:16:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67ee 02-22 00:16:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[67ed 02-22 00:16:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67ef 02-22 00:16:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[67f0 02-22 00:16:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67f2 02-22 00:16:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330563497791100 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 71 bytes to 2 peers
[67f1 02-22 00:16:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[67f3 02-22 00:16:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67f4 02-22 00:16:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330563497791100 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 71 bytes
[67f5 02-22 00:16:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330563497791100 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 71 bytes
[67f6 02-22 00:16:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[67f7 02-22 00:16:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[67f8 02-22 00:16:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[67f9 02-22 00:16:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[67fa 02-22 00:16:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[67fb 02-22 00:16:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[67fc 02-22 00:16:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 bd 92 4c a0 8e a3 7a 84 1b b5 cb 6a 4c ff 5f |E..L...z....jL._|
00000010 95 a1 75 21 1d 68 4c 8f aa 31 f9 b2 0f 0b fa fd |..u!.hL..1......|
[67fd 02-22 00:16:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 78 01 37 59 83 57 f3 09 69 17 |0E.!..x.7Y.W..i.|
00000010 0c 84 f5 64 b0 3d 84 9c d7 fe e2 f6 9b e2 5d 66 |...d.=........]f|
00000020 e6 7d bc 46 82 02 20 35 a7 2b f8 71 93 b4 90 01 |.}.F.. 5.+.q....|
00000030 15 bc d3 e8 55 be 8c ef 36 ef a5 3b 5b 6e 36 78 |....U...6..;[n6x|
00000040 c4 bd cc d1 92 fa 2e |.......|
[67fe 02-22 00:16:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[67ff 02-22 00:16:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00300fe10 gate 1582330563973061600 evaluation starts
[6800 02-22 00:16:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00300fe10 signed by 0 principal evaluation starts (used [false])
[6801 02-22 00:16:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00300fe10 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6802 02-22 00:16:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00300fe10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6803 02-22 00:16:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00300fe10 principal evaluation fails
[6804 02-22 00:16:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00300fe10 gate 1582330563973061600 evaluation fails
[6805 02-22 00:16:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6806 02-22 00:16:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6807 02-22 00:16:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6808 02-22 00:16:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 bd 92 4c a0 8e a3 7a 84 1b b5 cb 6a 4c ff 5f |E..L...z....jL._|
00000010 95 a1 75 21 1d 68 4c 8f aa 31 f9 b2 0f 0b fa fd |..u!.hL..1......|
[6809 02-22 00:16:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 78 01 37 59 83 57 f3 09 69 17 |0E.!..x.7Y.W..i.|
00000010 0c 84 f5 64 b0 3d 84 9c d7 fe e2 f6 9b e2 5d 66 |...d.=........]f|
00000020 e6 7d bc 46 82 02 20 35 a7 2b f8 71 93 b4 90 01 |.}.F.. 5.+.q....|
00000030 15 bc d3 e8 55 be 8c ef 36 ef a5 3b 5b 6e 36 78 |....U...6..;[n6x|
00000040 c4 bd cc d1 92 fa 2e |.......|
[680a 02-22 00:16:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[680b 02-22 00:16:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054ca7a0 gate 1582330563988943300 evaluation starts
[680c 02-22 00:16:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054ca7a0 signed by 0 principal evaluation starts (used [false])
[680d 02-22 00:16:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054ca7a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[680e 02-22 00:16:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054ca7a0 principal evaluation succeeds for identity 0
[680f 02-22 00:16:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054ca7a0 gate 1582330563988943300 evaluation succeeds
[6810 02-22 00:16:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6811 02-22 00:16:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6812 02-22 00:16:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6813 02-22 00:16:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6814 02-22 00:16:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6815 02-22 00:16:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6816 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:44932
[6817 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel=businesschannel txID=f4723647 mspID=Org1MSP
[6818 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 f7 ef e1 62 fd d4 67 13 c3 76 db ae a5 5d c8 |....b..g..v...].|
00000010 c4 f1 b8 75 4c 5f 9c 6b 1d 16 4f bd 7c 08 bc bf |...uL_.k..O.|...|
[6819 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 06 0c 1d 2f 8e 5c e2 88 e9 42 43 |0D. !.../.\...BC|
00000010 af 21 c4 6a 0e 49 38 36 a1 7a 36 3a 82 9a 04 b9 |.!.j.I86.z6:....|
00000020 ab 26 1e 72 02 20 76 50 4e c4 d3 fa 02 6c 31 e1 |.&.r. vPN....l1.|
00000030 91 93 a8 7f cf 43 e9 0e 14 14 c4 82 d2 31 6f f2 |.....C.......1o.|
00000040 c1 c6 77 a3 42 e3 |..w.B.|
[681a 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel=businesschannel txID=f4723647 mspID=Org1MSP
[681b 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [f47236471401a8014e7f4391efa7d8f2f33f8806b44b25853b7807bcd68dd9e3]
[681c 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x66, 0x34, 0x37, 0x32, 0x33, 0x36, 0x34, 0x37, 0x31, 0x34, 0x30, 0x31, 0x61, 0x38, 0x30, 0x31, 0x34, 0x65, 0x37, 0x66, 0x34, 0x33, 0x39, 0x31, 0x65, 0x66, 0x61, 0x37, 0x64, 0x38, 0x66, 0x32, 0x66, 0x33, 0x33, 0x66, 0x38, 0x38, 0x30, 0x36, 0x62, 0x34, 0x34, 0x62, 0x32, 0x35, 0x38, 0x35, 0x33, 0x62, 0x37, 0x38, 0x30, 0x37, 0x62, 0x63, 0x64, 0x36, 0x38, 0x64, 0x64, 0x39, 0x65, 0x33}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x66, 0x34, 0x37, 0x32, 0x33, 0x36, 0x34, 0x37, 0x31, 0x34, 0x30, 0x31, 0x61, 0x38, 0x30, 0x31, 0x34, 0x65, 0x37, 0x66, 0x34, 0x33, 0x39, 0x31, 0x65, 0x66, 0x61, 0x37, 0x64, 0x38, 0x66, 0x32, 0x66, 0x33, 0x33, 0x66, 0x38, 0x38, 0x30, 0x36, 0x62, 0x34, 0x34, 0x62, 0x32, 0x35, 0x38, 0x35, 0x33, 0x62, 0x37, 0x38, 0x30, 0x37, 0x62, 0x63, 0x64, 0x36, 0x38, 0x64, 0x64, 0x39, 0x65, 0x33, 0xff}]
[681d 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[681e 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [f47236471401a8014e7f4391efa7d8f2f33f8806b44b25853b7807bcd68dd9e3]
[681f 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] getting chaincode data for _lifecycle on channel businesschannel
[6820 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[6821 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy not found in config for resource _lifecycle/CheckCommitReadiness
[6822 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[6823 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6824 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[6825 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 f7 ef e1 62 fd d4 67 13 c3 76 db ae a5 5d c8 |....b..g..v...].|
00000010 c4 f1 b8 75 4c 5f 9c 6b 1d 16 4f bd 7c 08 bc bf |...uL_.k..O.|...|
[6826 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 06 0c 1d 2f 8e 5c e2 88 e9 42 43 |0D. !.../.\...BC|
00000010 af 21 c4 6a 0e 49 38 36 a1 7a 36 3a 82 9a 04 b9 |.!.j.I86.z6:....|
00000020 ab 26 1e 72 02 20 76 50 4e c4 d3 fa 02 6c 31 e1 |.&.r. vPN....l1.|
00000030 91 93 a8 7f cf 43 e9 0e 14 14 c4 82 d2 31 6f f2 |.....C.......1o.|
00000040 c1 c6 77 a3 42 e3 |..w.B.|
[6827 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6828 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003043480 gate 1582330564048041300 evaluation starts
[6829 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003043480 signed by 0 principal evaluation starts (used [false])
[682a 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003043480 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[682b 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003043480 principal evaluation succeeds for identity 0
[682c 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003043480 gate 1582330564048041300 evaluation succeeds
[682d 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers
[682e 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[682f 02-22 00:16:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[6830 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[6831 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU received invocation of CheckCommitReadiness on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: false), validation info: (plugin: '', policy: ''), collections: (<nil>)'
[6832 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[6833 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] handling GET_STATE from chaincode
[6834 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel
[6835 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[6836 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload
[6837 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Completed GET_STATE. Sending RESPONSE
[6838 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6839 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] handling GET_PRIVATE_DATA_HASH from chaincode
[683a 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel
[683b 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[683c 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > maximum_peer_count:1 > > ]
[683d 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[683e 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[683f 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6840 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] handling GET_PRIVATE_DATA_HASH from chaincode
[6841 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel
[6842 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[6843 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6844 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6845 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] handling GET_PRIVATE_DATA_HASH from chaincode
[6846 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel
[6847 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[6848 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6849 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[684a 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] handling GET_PRIVATE_DATA_HASH from chaincode
[684b 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel
[684c 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[684d 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[684e 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[684f 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] handling GET_PRIVATE_DATA_HASH from chaincode
[6850 02-22 00:16:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel
[6851 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[6852 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6853 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6854 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] handling GET_PRIVATE_DATA_HASH from chaincode
[6855 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel
[6856 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[6857 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6858 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6859 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] handling GET_PRIVATE_DATA_HASH from chaincode
[685a 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel
[685b 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[685c 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[685d 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[685e 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] handling GET_PRIVATE_DATA_HASH from chaincode
[685f 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel
[6860 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[6861 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6862 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> INFO Successfully checked commit readiness of chaincode name 'exp02' on channel 'businesschannel' with definition {sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (<nil>)}
[6863 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[6864 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [f4723647] notifying Txid:f47236471401a8014e7f4391efa7d8f2f33f8806b44b25853b7807bcd68dd9e3, channelID:businesschannel
[6865 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[6866 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: _lifecycle duration: 20ms channel=businesschannel txID=f4723647
[6867 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[6868 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f47236471401a8014e7f4391efa7d8f2f33f8806b44b25853b7807bcd68dd9e3]
[6869 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU escc for chaincode _lifecycle is escc channel=businesschannel txID=f4723647
[686a 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2021CF0839CA8B7CF75EEEDF5AAEBF...455254494649434154452D2D2D2D2D0A
[686b 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BFDC6D9DE5C0A6CD1531740A5D68C7CDCF843F316FB2AC3E2F6D9E92640AF8C3
[686c 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f47236471401a8014e7f4391efa7d8f2f33f8806b44b25853b7807bcd68dd9e3]
[686d 02-22 00:16:04.06 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44932 grpc.code=OK grpc.call_duration=26.2007ms
[686e 02-22 00:16:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[686f 02-22 00:16:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:44932: read: connection reset by peer
[6870 02-22 00:16:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6871 02-22 00:16:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[6872 02-22 00:16:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[6873 02-22 00:16:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6874 02-22 00:16:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6875 02-22 00:16:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6876 02-22 00:16:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6877 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424343087800 seq_num:1582330563525495900 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7 properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[6878 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424343087800 seq_num:1582330563525495900 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7 properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[6879 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[687a 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[687b 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[687c 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[687d 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[687e 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[687f 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6880 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3b 50 f2 d6 db 5d 0a 80 bc a1 f0 d9 c2 42 32 |.;P...].......B2|
00000010 09 fa cd 83 26 f0 61 0b 4c d1 f1 13 a7 34 40 5c |....&.a.L....4@\|
[6881 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 2b b2 3a 2f 23 ae 8f 9a e0 13 0e |0D. .+.:/#......|
00000010 fa f5 82 37 37 4a 0f ab 0e e7 21 87 7d bf f0 c1 |...77J....!.}...|
00000020 17 0d a5 15 02 20 5e 94 ea 70 56 27 ab 56 e3 42 |..... ^..pV'.V.B|
00000030 69 04 7c c8 be 99 11 13 f0 7b c2 27 0b 3c a5 fe |i.|......{.'.<..|
00000040 75 c8 2c 56 69 6a |u.,Vij|
[6882 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6883 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cdbd0 gate 1582330564188342100 evaluation starts
[6884 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cdbd0 signed by 0 principal evaluation starts (used [false])
[6885 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cdbd0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6886 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cdbd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6887 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cdbd0 principal evaluation fails
[6888 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030cdbd0 gate 1582330564188342100 evaluation fails
[6889 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[688a 02-22 00:16:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[688b 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[688c 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3b 50 f2 d6 db 5d 0a 80 bc a1 f0 d9 c2 42 32 |.;P...].......B2|
00000010 09 fa cd 83 26 f0 61 0b 4c d1 f1 13 a7 34 40 5c |....&.a.L....4@\|
[688d 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 2b b2 3a 2f 23 ae 8f 9a e0 13 0e |0D. .+.:/#......|
00000010 fa f5 82 37 37 4a 0f ab 0e e7 21 87 7d bf f0 c1 |...77J....!.}...|
00000020 17 0d a5 15 02 20 5e 94 ea 70 56 27 ab 56 e3 42 |..... ^..pV'.V.B|
00000030 69 04 7c c8 be 99 11 13 f0 7b c2 27 0b 3c a5 fe |i.|......{.'.<..|
00000040 75 c8 2c 56 69 6a |u.,Vij|
[688e 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[688f 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ee4d0 gate 1582330564191206900 evaluation starts
[6890 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ee4d0 signed by 0 principal evaluation starts (used [false])
[6891 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ee4d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6892 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ee4d0 principal evaluation succeeds for identity 0
[6893 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ee4d0 gate 1582330564191206900 evaluation succeeds
[6894 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6895 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6896 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6897 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6898 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6899 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[689a 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[689b 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[689c 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[689d 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[689e 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[689f 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3b 50 f2 d6 db 5d 0a 80 bc a1 f0 d9 c2 42 32 |.;P...].......B2|
00000010 09 fa cd 83 26 f0 61 0b 4c d1 f1 13 a7 34 40 5c |....&.a.L....4@\|
[68a0 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 2b b2 3a 2f 23 ae 8f 9a e0 13 0e |0D. .+.:/#......|
00000010 fa f5 82 37 37 4a 0f ab 0e e7 21 87 7d bf f0 c1 |...77J....!.}...|
00000020 17 0d a5 15 02 20 5e 94 ea 70 56 27 ab 56 e3 42 |..... ^..pV'.V.B|
00000030 69 04 7c c8 be 99 11 13 f0 7b c2 27 0b 3c a5 fe |i.|......{.'.<..|
00000040 75 c8 2c 56 69 6a |u.,Vij|
[68a1 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[68a2 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ef330 gate 1582330564195239200 evaluation starts
[68a3 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ef330 signed by 0 principal evaluation starts (used [false])
[68a4 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ef330 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[68a5 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ef330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[68a6 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ef330 principal evaluation fails
[68a7 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ef330 gate 1582330564195239200 evaluation fails
[68a8 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[68a9 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[68aa 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[68ab 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3b 50 f2 d6 db 5d 0a 80 bc a1 f0 d9 c2 42 32 |.;P...].......B2|
00000010 09 fa cd 83 26 f0 61 0b 4c d1 f1 13 a7 34 40 5c |....&.a.L....4@\|
[68ac 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 2b b2 3a 2f 23 ae 8f 9a e0 13 0e |0D. .+.:/#......|
00000010 fa f5 82 37 37 4a 0f ab 0e e7 21 87 7d bf f0 c1 |...77J....!.}...|
00000020 17 0d a5 15 02 20 5e 94 ea 70 56 27 ab 56 e3 42 |..... ^..pV'.V.B|
00000030 69 04 7c c8 be 99 11 13 f0 7b c2 27 0b 3c a5 fe |i.|......{.'.<..|
00000040 75 c8 2c 56 69 6a |u.,Vij|
[68ad 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[68ae 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030efc30 gate 1582330564197847300 evaluation starts
[68af 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030efc30 signed by 0 principal evaluation starts (used [false])
[68b0 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030efc30 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[68b1 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030efc30 principal evaluation succeeds for identity 0
[68b2 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030efc30 gate 1582330564197847300 evaluation succeeds
[68b3 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[68b4 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[68b5 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[68b6 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[68b7 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68b8 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68b9 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68ba 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424343087800 seq_num:1582330563525495900 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7 properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes to 2 peers
[68bb 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68bc 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68bd 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424343087800 seq_num:1582330563525495900 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7 properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[68be 02-22 00:16:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68bf 02-22 00:16:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424343087800 seq_num:1582330563525495900 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7 properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[68c0 02-22 00:16:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68c1 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[68c2 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[68c3 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68c4 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[68c5 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[68c6 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68c7 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[68c8 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[68c9 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[68ca 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[68cb 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[68cc 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[68cd 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 a4 4a e6 06 d3 d5 7e b2 d5 cd c6 10 f3 d1 cf |..J....~........|
00000010 93 2f 25 56 89 d8 83 25 61 aa 09 d2 c7 00 15 f7 |./%V...%a.......|
[68ce 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 37 e9 3f d3 8a f8 2e a3 21 13 91 |0D. }7.?.....!..|
00000010 43 bf b3 9e b3 fc 64 b9 e1 ce d9 ff 05 a3 bf 1c |C.....d.........|
00000020 95 54 f7 9e 02 20 75 8e e4 1a cc 8b 6c bc dd 4f |.T... u.....l..O|
00000030 46 cf 38 ae 86 63 42 a7 9f 4a 40 d1 05 14 6f 92 |F.8..cB..J@...o.|
00000040 17 ac 07 99 5f a2 |...._.|
[68cf 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[68d0 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031144c0 gate 1582330564269073500 evaluation starts
[68d1 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031144c0 signed by 0 principal evaluation starts (used [false])
[68d2 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031144c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[68d3 02-22 00:16:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031144c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[68d4 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031144c0 principal evaluation fails
[68d5 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031144c0 gate 1582330564269073500 evaluation fails
[68d6 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[68d7 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[68d8 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[68d9 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 a4 4a e6 06 d3 d5 7e b2 d5 cd c6 10 f3 d1 cf |..J....~........|
00000010 93 2f 25 56 89 d8 83 25 61 aa 09 d2 c7 00 15 f7 |./%V...%a.......|
[68da 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 37 e9 3f d3 8a f8 2e a3 21 13 91 |0D. }7.?.....!..|
00000010 43 bf b3 9e b3 fc 64 b9 e1 ce d9 ff 05 a3 bf 1c |C.....d.........|
00000020 95 54 f7 9e 02 20 75 8e e4 1a cc 8b 6c bc dd 4f |.T... u.....l..O|
00000030 46 cf 38 ae 86 63 42 a7 9f 4a 40 d1 05 14 6f 92 |F.8..cB..J@...o.|
00000040 17 ac 07 99 5f a2 |...._.|
[68db 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[68dc 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003114dc0 gate 1582330564272273200 evaluation starts
[68dd 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003114dc0 signed by 0 principal evaluation starts (used [false])
[68de 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003114dc0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[68df 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003114dc0 principal evaluation succeeds for identity 0
[68e0 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003114dc0 gate 1582330564272273200 evaluation succeeds
[68e1 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[68e2 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[68e3 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[68e4 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[68e5 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[68e6 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes]}
[68e7 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:80
[68e8 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:80
[68e9 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[68ea 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68eb 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68ec 02-22 00:16:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68ed 02-22 00:16:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68ee 02-22 00:16:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68ef 02-22 00:16:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68f0 02-22 00:16:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68f1 02-22 00:16:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68f2 02-22 00:16:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68f3 02-22 00:16:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68f4 02-22 00:16:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[68f5 02-22 00:16:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[68f6 02-22 00:16:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[68f7 02-22 00:16:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[68f8 02-22 00:16:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68f9 02-22 00:16:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[68fa 02-22 00:16:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[68fb 02-22 00:16:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[68fc 02-22 00:16:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[68fd 02-22 00:16:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA15101D1801
[68fe 02-22 00:16:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ED7FFC06BAA9CCA53B5D96631788AF9EF4C192BE089D24115D195F3F0433BBF1
[68ff 02-22 00:16:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[6900 02-22 00:16:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6901 02-22 00:16:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6902 02-22 00:16:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6903 02-22 00:16:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6904 02-22 00:16:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:29 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[6905 02-22 00:16:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6906 02-22 00:16:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6907 02-22 00:16:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:29 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[6908 02-22 00:16:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6909 02-22 00:16:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15104D
[690a 02-22 00:16:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 375042D001FA1EC5FD527F5329C008A4CFE8864940D06D1284A81AABCBAD6D11
[690b 02-22 00:16:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[690c 02-22 00:16:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[690d 02-22 00:16:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[690e 02-22 00:16:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[690f 02-22 00:16:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6910 02-22 00:16:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6911 02-22 00:16:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[6912 02-22 00:16:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6914 02-22 00:16:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[6915 02-22 00:16:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[6917 02-22 00:16:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[6913 02-22 00:16:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes
[6916 02-22 00:16:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes
[6918 02-22 00:16:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6919 02-22 00:16:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[691a 02-22 00:16:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[691b 02-22 00:16:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[691c 02-22 00:16:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[691d 02-22 00:16:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[691e 02-22 00:16:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[691f 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6920 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6921 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[6922 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6923 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[6924 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d1 c4 9c 56 71 54 3a d5 12 7f f1 74 21 92 78 6c |...VqT:....t!.xl|
00000010 85 9a 0a a3 ba ca e3 7f 07 12 42 14 bb f5 c1 3f |..........B....?|
[6925 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 38 d2 09 a3 77 42 53 26 b3 be a8 |0D. !8...wBS&...|
00000010 aa d7 79 ad ec da 87 0b 49 9a fe fe 36 54 9c 6a |..y.....I...6T.j|
00000020 35 4f 6c 62 02 20 67 21 6d 25 39 14 92 11 4a c3 |5Olb. g!m%9...J.|
00000030 9b 0e c8 99 3c cd 2f ed 01 70 ba 1f 5d 6a bc 3f |....<./..p..]j.?|
00000040 2d 20 dd 5a 74 96 |- .Zt.|
[6926 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[6927 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 68 79 3c fb 5b 55 ae c3 36 b4 45 |0D. ,hy<.[U..6.E|
00000010 f9 d2 b6 16 e7 aa ec 51 51 fd 6b a3 1e 46 7e 4b |.......QQ.k..F~K|
00000020 a5 20 ad 18 02 20 7b fe 8c 30 11 0c 10 60 a0 59 |. ... {..0...`.Y|
00000030 a8 95 c5 61 39 09 b0 e4 e7 96 e9 27 9f 22 3f 0b |...a9......'."?.|
00000040 82 aa e2 24 1e eb |...$..|
[6928 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6929 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[692a 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:81
[692b 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:81
[692c 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[692d 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[692e 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[692f 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6930 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[6931 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6932 02-22 00:16:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6933 02-22 00:16:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6934 02-22 00:16:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6935 02-22 00:16:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6936 02-22 00:16:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[6937 02-22 00:16:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6938 02-22 00:16:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[6939 02-22 00:16:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes
[693a 02-22 00:16:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[693b 02-22 00:16:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes
[693c 02-22 00:16:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[693d 02-22 00:16:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes
[693e 02-22 00:16:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes
[693f 02-22 00:16:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6940 02-22 00:16:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes
[6941 02-22 00:16:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6942 02-22 00:16:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6943 02-22 00:16:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6944 02-22 00:16:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6945 02-22 00:16:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[6946 02-22 00:16:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6947 02-22 00:16:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6948 02-22 00:16:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6949 02-22 00:16:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[694a 02-22 00:16:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[694b 02-22 00:16:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[694c 02-22 00:16:05.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[694d 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 26 45 bb 3f b4 d6 63 89 11 cd fc 78 98 51 3b |.&E.?..c....x.Q;|
00000010 03 b7 70 c1 22 cd 04 33 a3 40 13 6e c7 26 4e 27 |..p."..3.@.n.&N'|
[694e 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2d ca 1c 30 9a 3b 07 0f 45 67 be e2 |0D. -..0.;..Eg..|
00000010 1b 14 75 2c 1b 05 00 16 f3 1b 19 3a 99 88 68 d4 |..u,.......:..h.|
00000020 09 32 db 83 02 20 3f 87 0f 08 96 52 f3 5e d9 6a |.2... ?....R.^.j|
00000030 ba ca 81 61 36 2b 6b 69 10 e6 5b cf d4 a9 93 f7 |...a6+ki..[.....|
00000040 bf d9 bd a1 86 00 |......|
[694f 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6950 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b9760 gate 1582330565170538100 evaluation starts
[6951 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b9760 signed by 0 principal evaluation starts (used [false])
[6952 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b9760 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6953 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b9760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6954 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b9760 principal evaluation fails
[6955 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b9760 gate 1582330565170538100 evaluation fails
[6956 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6957 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6958 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6959 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 26 45 bb 3f b4 d6 63 89 11 cd fc 78 98 51 3b |.&E.?..c....x.Q;|
00000010 03 b7 70 c1 22 cd 04 33 a3 40 13 6e c7 26 4e 27 |..p."..3.@.n.&N'|
[695a 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2d ca 1c 30 9a 3b 07 0f 45 67 be e2 |0D. -..0.;..Eg..|
00000010 1b 14 75 2c 1b 05 00 16 f3 1b 19 3a 99 88 68 d4 |..u,.......:..h.|
00000020 09 32 db 83 02 20 3f 87 0f 08 96 52 f3 5e d9 6a |.2... ?....R.^.j|
00000030 ba ca 81 61 36 2b 6b 69 10 e6 5b cf d4 a9 93 f7 |...a6+ki..[.....|
00000040 bf d9 bd a1 86 00 |......|
[695b 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[695c 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200060 gate 1582330565171743000 evaluation starts
[695d 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200060 signed by 0 principal evaluation starts (used [false])
[695e 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200060 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[695f 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200060 principal evaluation succeeds for identity 0
[6960 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200060 gate 1582330565171743000 evaluation succeeds
[6961 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6962 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6963 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6964 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6965 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6966 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes]}
[6967 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:78
[6968 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:78
[6969 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:77 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[696a 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[696b 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[696c 02-22 00:16:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[696d 02-22 00:16:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[696e 02-22 00:16:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[696f 02-22 00:16:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6970 02-22 00:16:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6971 02-22 00:16:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6972 02-22 00:16:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6973 02-22 00:16:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6974 02-22 00:16:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6975 02-22 00:16:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6976 02-22 00:16:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6977 02-22 00:16:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6978 02-22 00:16:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6979 02-22 00:16:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[697a 02-22 00:16:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[697b 02-22 00:16:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[697c 02-22 00:16:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[697d 02-22 00:16:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[697e 02-22 00:16:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[697f 02-22 00:16:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6980 02-22 00:16:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6981 02-22 00:16:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6982 02-22 00:16:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6983 02-22 00:16:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6984 02-22 00:16:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:44940
[6985 02-22 00:16:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel= txID=2bae02eb mspID=Org1MSP
[6986 02-22 00:16:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 78 b6 ac 25 ff 53 4a 50 55 96 0c 8d 3e ed f3 |.x..%.SJPU...>..|
00000010 a7 63 4f 8a e9 3f 3a 35 19 7f 38 13 4e 2a e0 9a |.cO..?:5..8.N*..|
[6987 02-22 00:16:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 bd f9 a0 24 d3 04 58 7c a6 48 d6 |0D. t...$..X|.H.|
00000010 ed b4 7b 26 45 12 a8 e7 8e 0f 2d 78 42 25 7e 61 |..{&E.....-xB%~a|
00000020 5b f2 9d d6 02 20 1e 7c 9f 0e a9 ff 2f 9f 83 7c |[.... .|..../..||
00000030 c9 d0 20 25 bb c5 39 bc a0 d9 b0 1b 02 2c 83 ae |.. %..9......,..|
00000040 6f 02 7e b2 ff 76 |o.~..v|
[6988 02-22 00:16:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel= txID=2bae02eb mspID=Org1MSP
[6989 02-22 00:16:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU [2bae02eb] getting chaincode data for _lifecycle on channel
[698a 02-22 00:16:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[698b 02-22 00:16:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 78 b6 ac 25 ff 53 4a 50 55 96 0c 8d 3e ed f3 |.x..%.SJPU...>..|
00000010 a7 63 4f 8a e9 3f 3a 35 19 7f 38 13 4e 2a e0 9a |.cO..?:5..8.N*..|
[698c 02-22 00:16:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 bd f9 a0 24 d3 04 58 7c a6 48 d6 |0D. t...$..X|.H.|
00000010 ed b4 7b 26 45 12 a8 e7 8e 0f 2d 78 42 25 7e 61 |..{&E.....-xB%~a|
00000020 5b f2 9d d6 02 20 1e 7c 9f 0e a9 ff 2f 9f 83 7c |[.... .|..../..||
00000030 c9 d0 20 25 bb c5 39 bc a0 d9 b0 1b 02 2c 83 ae |.. %..9......,..|
00000040 6f 02 7e b2 ff 76 |o.~..v|
[698d 02-22 00:16:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU received invocation of QueryInstalledChaincodes
[698e 02-22 00:16:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU [2bae02eb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[698f 02-22 00:16:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU [2bae02eb] notifying Txid:2bae02ebd3c66d68dac6f629c29ca6a5e77f910bc36da87b3f2df4b6a6be8eb2, channelID:
[6990 02-22 00:16:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[6991 02-22 00:16:05.77 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: _lifecycle duration: 2ms channel= txID=2bae02eb
[6992 02-22 00:16:05.77 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44940 grpc.code=OK grpc.call_duration=4.8053ms
[6993 02-22 00:16:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6994 02-22 00:16:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6995 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:44944
[6996 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel=businesschannel txID=1f76a0ed mspID=Org1MSP
[6997 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 d6 c6 92 ce 9d f7 fb eb 8d 21 ea 3c f2 c7 31 |$.........!.<..1|
00000010 4e c4 51 01 26 e0 18 92 1f f7 cb 5b d9 e9 8a 81 |N.Q.&......[....|
[6998 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 6b 9d e0 2f ca aa 67 fc 40 8b b9 |0D. Hk../..g.@..|
00000010 67 6b 9c 66 d0 8c 30 43 96 42 db 35 ee bf 15 6c |gk.f..0C.B.5...l|
00000020 84 fb a8 1d 02 20 14 89 b8 1b 32 fb 40 55 15 d8 |..... ....2.@U..|
00000030 3b 32 f5 25 bf c1 c6 27 b1 3b dd 55 6b 53 43 94 |;2.%...'.;.UkSC.|
00000040 e2 c1 dc af e9 61 |.....a|
[6999 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel=businesschannel txID=1f76a0ed mspID=Org1MSP
[699a 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [1f76a0ed7577404cf96faf863ebc8789955936d1a165c3aa732083f574d4184d]
[699b 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x31, 0x66, 0x37, 0x36, 0x61, 0x30, 0x65, 0x64, 0x37, 0x35, 0x37, 0x37, 0x34, 0x30, 0x34, 0x63, 0x66, 0x39, 0x36, 0x66, 0x61, 0x66, 0x38, 0x36, 0x33, 0x65, 0x62, 0x63, 0x38, 0x37, 0x38, 0x39, 0x39, 0x35, 0x35, 0x39, 0x33, 0x36, 0x64, 0x31, 0x61, 0x31, 0x36, 0x35, 0x63, 0x33, 0x61, 0x61, 0x37, 0x33, 0x32, 0x30, 0x38, 0x33, 0x66, 0x35, 0x37, 0x34, 0x64, 0x34, 0x31, 0x38, 0x34, 0x64}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x31, 0x66, 0x37, 0x36, 0x61, 0x30, 0x65, 0x64, 0x37, 0x35, 0x37, 0x37, 0x34, 0x30, 0x34, 0x63, 0x66, 0x39, 0x36, 0x66, 0x61, 0x66, 0x38, 0x36, 0x33, 0x65, 0x62, 0x63, 0x38, 0x37, 0x38, 0x39, 0x39, 0x35, 0x35, 0x39, 0x33, 0x36, 0x64, 0x31, 0x61, 0x31, 0x36, 0x35, 0x63, 0x33, 0x61, 0x61, 0x37, 0x33, 0x32, 0x30, 0x38, 0x33, 0x66, 0x35, 0x37, 0x34, 0x64, 0x34, 0x31, 0x38, 0x34, 0x64, 0xff}]
[699c 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[699d 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [1f76a0ed7577404cf96faf863ebc8789955936d1a165c3aa732083f574d4184d]
[699e 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] getting chaincode data for _lifecycle on channel businesschannel
[699f 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[69a0 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource _lifecycle/CommitChaincodeDefinition
[69a1 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[69a2 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[69a3 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[69a4 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[69a5 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 d6 c6 92 ce 9d f7 fb eb 8d 21 ea 3c f2 c7 31 |$.........!.<..1|
00000010 4e c4 51 01 26 e0 18 92 1f f7 cb 5b d9 e9 8a 81 |N.Q.&......[....|
[69a6 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 6b 9d e0 2f ca aa 67 fc 40 8b b9 |0D. Hk../..g.@..|
00000010 67 6b 9c 66 d0 8c 30 43 96 42 db 35 ee bf 15 6c |gk.f..0C.B.5...l|
00000020 84 fb a8 1d 02 20 14 89 b8 1b 32 fb 40 55 15 d8 |..... ....2.@U..|
00000030 3b 32 f5 25 bf c1 c6 27 b1 3b dd 55 6b 53 43 94 |;2.%...'.;.UkSC.|
00000040 e2 c1 dc af e9 61 |.....a|
[69a7 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[69a8 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a5620 gate 1582330566015942500 evaluation starts
[69a9 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a5620 signed by 0 principal evaluation starts (used [false])
[69aa 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a5620 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[69ab 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a5620 principal evaluation succeeds for identity 0
[69ac 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a5620 gate 1582330566015942500 evaluation succeeds
[69ad 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers
[69ae 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[69af 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[69b0 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[69b1 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[69b2 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02
[69b3 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU received invocation of CommitChaincodeDefinition on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (<nil>)'
[69b4 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[69b5 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] handling GET_STATE from chaincode
[69b6 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel
[69b7 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[69b8 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload
[69b9 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Completed GET_STATE. Sending RESPONSE
[69ba 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[69bb 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] handling GET_PRIVATE_DATA_HASH from chaincode
[69bc 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel
[69bd 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[69be 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > maximum_peer_count:1 > > ]
[69bf 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[69c0 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[69c1 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[69c2 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] handling GET_PRIVATE_DATA_HASH from chaincode
[69c3 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel
[69c4 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[69c5 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[69c6 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[69c7 02-22 00:16:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] handling GET_PRIVATE_DATA_HASH from chaincode
[69c8 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel
[69c9 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[69ca 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[69cb 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[69cc 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] handling GET_PRIVATE_DATA_HASH from chaincode
[69cd 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel
[69ce 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[69cf 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[69d0 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[69d1 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] handling GET_PRIVATE_DATA_HASH from chaincode
[69d2 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel
[69d3 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[69d4 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[69d5 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[69d6 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] handling GET_PRIVATE_DATA_HASH from chaincode
[69d7 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel
[69d8 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[69d9 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[69da 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[69db 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] handling GET_PRIVATE_DATA_HASH from chaincode
[69dc 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel
[69dd 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[69de 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[69df 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[69e0 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] handling GET_PRIVATE_DATA_HASH from chaincode
[69e1 02-22 00:16:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel
[69e2 02-22 00:16:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[69e3 02-22 00:16:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[69e4 02-22 00:16:06.03 UTC] [%{longpkg}] %{callpath} -> INFO Successfully checked commit readiness of chaincode name 'exp02' on channel 'businesschannel' with definition {sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (<nil>)}
[69e5 02-22 00:16:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[69e6 02-22 00:16:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] handling GET_STATE from chaincode
[69e7 02-22 00:16:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel
[69e8 02-22 00:16:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[69e9 02-22 00:16:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] No state associated with key: namespaces/metadata/exp02. Sending RESPONSE with an empty payload
[69ea 02-22 00:16:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Completed GET_STATE. Sending RESPONSE
[69eb 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[69ec 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] handling PUT_STATE from chaincode
[69ed 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Completed PUT_STATE. Sending RESPONSE
[69ee 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[69ef 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] handling PUT_STATE from chaincode
[69f0 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Completed PUT_STATE. Sending RESPONSE
[69f1 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[69f2 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] handling PUT_STATE from chaincode
[69f3 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Completed PUT_STATE. Sending RESPONSE
[69f4 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[69f5 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] handling PUT_STATE from chaincode
[69f6 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Completed PUT_STATE. Sending RESPONSE
[69f7 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[69f8 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] handling PUT_STATE from chaincode
[69f9 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Completed PUT_STATE. Sending RESPONSE
[69fa 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> INFO Successfully endorsed commit for chaincode name 'exp02' on channel 'businesschannel' with definition {sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (<nil>)}
[69fb 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[69fc 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU [1f76a0ed] notifying Txid:1f76a0ed7577404cf96faf863ebc8789955936d1a165c3aa732083f574d4184d, channelID:businesschannel
[69fd 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[69fe 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: _lifecycle duration: 33ms channel=businesschannel txID=1f76a0ed
[69ff 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[6a00 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1f76a0ed7577404cf96faf863ebc8789955936d1a165c3aa732083f574d4184d]
[6a01 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU escc for chaincode _lifecycle is escc channel=businesschannel txID=1f76a0ed
[6a02 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A209D720A82EA9386A145A688CF8850...455254494649434154452D2D2D2D2D0A
[6a03 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D85E1056A3AE28BFC119AB1644062CE0913887D1F98F0363565460200541B52C
[6a04 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1f76a0ed7577404cf96faf863ebc8789955936d1a165c3aa732083f574d4184d]
[6a05 02-22 00:16:06.04 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44944 grpc.code=OK grpc.call_duration=37.1755ms
[6a06 02-22 00:16:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Starting new DeliverFiltered handler
[6a07 02-22 00:16:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Starting new deliver loop for 172.18.0.9:44946
[6a08 02-22 00:16:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to read seek info message from 172.18.0.9:44946
[6a09 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock
[6a0a 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers)
[6a0b 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6a0c 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6a0d 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6a0e 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 a9 75 f8 e9 11 88 6c 20 88 1f 1d b0 37 3c 68 |..u....l ....7<h|
00000010 3b 39 37 fa e5 33 2d ad e3 28 e8 ce 20 07 45 e9 |;97..3-..(.. .E.|
[6a0f 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 70 11 4e c2 3b c1 be 7b be eb 34 |0D. [p.N.;..{..4|
00000010 45 32 c7 ac b4 a7 09 d3 e8 37 7e e2 a0 d8 0d 57 |E2.......7~....W|
00000020 68 34 5b d7 02 20 47 a1 ae 7d 4d da 14 f1 19 db |h4[.. G..}M.....|
00000030 31 a1 31 a0 d1 7a 46 9e ba 46 fd 43 80 96 1f 7d |1.1..zF..F.C...}|
00000040 3a 3d a1 2f d8 6f |:=./.o|
[6a10 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6a11 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033828e0 gate 1582330566103525200 evaluation starts
[6a12 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033828e0 signed by 0 principal evaluation starts (used [false])
[6a13 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033828e0 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[6a14 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033828e0 principal evaluation succeeds for identity 0
[6a15 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033828e0 gate 1582330566103525200 evaluation succeeds
[6a16 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[6a17 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6a18 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6a19 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6a1a 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU [channel: businesschannel] Received seekInfo (0xc0031709c0) start:<newest:<> > stop:<specified:<number:18446744073709551615 > > from 172.18.0.9:44946
[6a1b 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing block stream for iterator. itr.maxBlockNumAvailable=4
[6a1c 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[82907]
[6a1d 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[4776], Going to peek [8] bytes
[6a1e 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[4774], placementInfo={fileNum=[0], startOffset=[82907], bytesOffset=[82909]}
[6a1f 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU blockbytes [4774] read from file [0]
[6a20 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU [channel: businesschannel] Delivering block [4] for (0xc0031709c0) for 172.18.0.9:44946
[6a21 02-22 00:16:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]
[6a22 02-22 00:16:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:1745103132155779270 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6a23 02-22 00:16:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1745103132155779270 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6a24 02-22 00:16:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a25 02-22 00:16:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a26 02-22 00:16:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a27 02-22 00:16:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a28 02-22 00:16:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a29 02-22 00:16:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a2a 02-22 00:16:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[6a2b 02-22 00:16:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a2c 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[6a2d 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a2e 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[6a2f 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[6a30 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 b5 48 36 d3 3e 5d 24 26 9f 0b b0 d6 b0 b5 08 |c.H6.>]$&.......|
00000010 bf bf f0 d5 c3 f6 cf c2 c2 a4 3d ac a4 95 d3 e7 |..........=.....|
[6a31 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 6c 70 a1 0f 61 14 9d fa b1 13 24 |0D. Elp..a.....$|
00000010 09 a9 e7 94 75 a4 90 c3 77 a3 2c 5a 3a a3 6d 01 |....u...w.,Z:.m.|
00000020 f4 ce ac 9c 02 20 2e 55 ca c7 19 c9 00 22 4e 9c |..... .U....."N.|
00000030 b7 12 aa 57 08 67 04 00 cc 93 f8 26 93 43 b7 fb |...W.g.....&.C..|
00000040 d0 bc 49 99 5a fc |..I.Z.|
[6a32 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[6a33 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd 9c b7 32 b9 9e be 12 48 03 98 |0E.!....2....H..|
00000010 3c 95 61 30 4a 57 34 5a b5 2a f7 8b 3e d9 36 b7 |<.a0JW4Z.*..>.6.|
00000020 4a cb 4a 94 cc 02 20 3f af c4 ff f4 55 45 43 67 |J.J... ?....UECg|
00000030 5f 2e 78 95 63 34 13 ca de 42 cf 87 c3 e0 cf f4 |_.x.c4...B......|
00000040 63 2f df 80 8f 82 66 |c/....f|
[6a34 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[6a35 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[6a36 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:82
[6a37 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:82
[6a38 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[6a39 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a3a 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a3b 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a3c 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[6a3d 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a3e 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a3f 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[6a40 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[6a41 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[6a42 02-22 00:16:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a43 02-22 00:16:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:14771467357594467324 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6a44 02-22 00:16:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:14771467357594467324 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6a45 02-22 00:16:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[6a46 02-22 00:16:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a47 02-22 00:16:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:13912189731062065395 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6a48 02-22 00:16:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:13912189731062065395 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6a49 02-22 00:16:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13912189731062065395 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6a4a 02-22 00:16:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a4b 02-22 00:16:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a4c 02-22 00:16:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a4d 02-22 00:16:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a4e 02-22 00:16:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a4f 02-22 00:16:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a50 02-22 00:16:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[6a51 02-22 00:16:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a52 02-22 00:16:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[6a53 02-22 00:16:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:4405397977422921715 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[6a54 02-22 00:16:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[6a55 02-22 00:16:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:4405397977422921715 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6a56 02-22 00:16:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a57 02-22 00:16:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7073240427733091426 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[6a58 02-22 00:16:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[6a5a 02-22 00:16:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:12317994128303841787 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[6a59 02-22 00:16:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7073240427733091426 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6a5b 02-22 00:16:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a5c 02-22 00:16:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:12317994128303841787 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6a5d 02-22 00:16:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a5e 02-22 00:16:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4405397977422921715 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[6a5f 02-22 00:16:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4405397977422921715 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[6a60 02-22 00:16:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a61 02-22 00:16:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12317994128303841787 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[6a62 02-22 00:16:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12317994128303841787 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[6a63 02-22 00:16:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a64 02-22 00:16:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7073240427733091426 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[6a65 02-22 00:16:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7073240427733091426 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[6a66 02-22 00:16:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7073240427733091426 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[6a67 02-22 00:16:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a68 02-22 00:16:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:81 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[6a69 02-22 00:16:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:81 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[6a6a 02-22 00:16:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a6b 02-22 00:16:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:81 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[6a6c 02-22 00:16:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[6a6d 02-22 00:16:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a6e 02-22 00:16:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6a6f 02-22 00:16:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6a70 02-22 00:16:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6a71 02-22 00:16:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6a72 02-22 00:16:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6a73 02-22 00:16:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6a74 02-22 00:16:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 e6 8e cf a9 c5 3d 91 6e c4 c4 8d 4b bf e4 3e |......=.n...K..>|
00000010 25 91 6b 7e d2 ab 9f ec b6 cf 49 4b 50 56 3e 3c |%.k~......IKPV><|
[6a75 02-22 00:16:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 e3 dd 58 44 50 2a 98 ce 2f fa |0E.!....XDP*../.|
00000010 59 61 ad 95 1f c7 6f 41 75 40 1e eb df f8 2e 20 |Ya....oAu@..... |
00000020 5a b4 18 5e f1 02 20 20 f8 10 35 45 58 d5 33 37 |Z..^.. ..5EX.37|
00000030 33 50 f7 f2 9b 5d 84 d1 b7 c7 5b 7d f0 40 7c 2a |3P...]....[}.@|*|
00000040 1b 7c ce 41 a6 87 21 |.|.A..!|
[6a76 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6a77 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56e0 gate 1582330566460532600 evaluation starts
[6a78 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56e0 signed by 0 principal evaluation starts (used [false])
[6a79 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56e0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6a7a 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6a7b 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56e0 principal evaluation fails
[6a7c 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e56e0 gate 1582330566460532600 evaluation fails
[6a7d 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6a7e 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6a7f 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6a80 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 e6 8e cf a9 c5 3d 91 6e c4 c4 8d 4b bf e4 3e |......=.n...K..>|
00000010 25 91 6b 7e d2 ab 9f ec b6 cf 49 4b 50 56 3e 3c |%.k~......IKPV><|
[6a81 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 e3 dd 58 44 50 2a 98 ce 2f fa |0E.!....XDP*../.|
00000010 59 61 ad 95 1f c7 6f 41 75 40 1e eb df f8 2e 20 |Ya....oAu@..... |
00000020 5a b4 18 5e f1 02 20 20 f8 10 35 45 58 d5 33 37 |Z..^.. ..5EX.37|
00000030 33 50 f7 f2 9b 5d 84 d1 b7 c7 5b 7d f0 40 7c 2a |3P...]....[}.@|*|
00000040 1b 7c ce 41 a6 87 21 |.|.A..!|
[6a82 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6a83 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e5fe0 gate 1582330566464259900 evaluation starts
[6a84 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e5fe0 signed by 0 principal evaluation starts (used [false])
[6a85 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e5fe0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6a86 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e5fe0 principal evaluation succeeds for identity 0
[6a87 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e5fe0 gate 1582330566464259900 evaluation succeeds
[6a88 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6a89 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6a8a 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6a8b 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6a8c 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:81 , Envelope: 83 bytes, Signature: 71 bytes
[6a8d 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:81 , Envelope: 83 bytes, Signature: 71 bytes]}
[6a8e 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:81
[6a8f 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:81
[6a90 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[6a91 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a92 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a93 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[6a94 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a95 02-22 00:16:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a96 02-22 00:16:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6a97 02-22 00:16:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[6a98 02-22 00:16:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[6a99 02-22 00:16:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[6a9a 02-22 00:16:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a9b 02-22 00:16:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6a9c 02-22 00:16:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15104E
[6a9d 02-22 00:16:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6D3106CB0C8432955E38DECD0AE09E19D9D43D90D2487AC5B48D54A82C5EC08B
[6a9e 02-22 00:16:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[6a9f 02-22 00:16:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[6aa0 02-22 00:16:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6aa1 02-22 00:16:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[6aa2 02-22 00:16:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6aa3 02-22 00:16:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[6aa4 02-22 00:16:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[6aa5 02-22 00:16:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[6aa6 02-22 00:16:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6aa7 02-22 00:16:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6aa8 02-22 00:16:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6aa9 02-22 00:16:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6aaa 02-22 00:16:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6aab 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[6aac 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6aad 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes
[6aae 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[6aaf 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d 31 06 cb 0c 84 32 95 5e 38 de cd 0a e0 9e 19 |m1....2.^8......|
00000010 d9 d4 3d 90 d2 48 7a c5 b4 8d 54 a8 2c 5e c0 8b |..=..Hz...T.,^..|
[6ab0 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b de 66 06 6f 54 44 50 e8 14 27 de |0D. ..f.oTDP..'.|
00000010 e7 17 ef 92 59 7f de 7b a8 b6 b6 8b 97 5b c6 76 |....Y..{.....[.v|
00000020 30 2e 5a 85 02 20 1e 40 c1 87 4d 3e b6 f0 31 72 |0.Z.. .@..M>..1r|
00000030 32 2d b2 83 2b 84 88 c1 56 18 61 d1 03 a7 f4 3b |2-..+...V.a....;|
00000040 c1 2c 5e 73 34 62 |.,^s4b|
[6ab1 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[6ab2 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 50 cb 2d 0f a5 2d 3f d5 39 83 cd |0D. CP.-..-?.9..|
00000010 b1 9e 8c b7 fe ad 50 c1 42 d7 91 83 b9 9f df c8 |......P.B.......|
00000020 ca 8f a0 df 02 20 62 e1 4a 6c 76 bb 45 a2 a2 0c |..... b.Jlv.E...|
00000030 ea c7 fd b7 cf f6 36 53 f0 ad 88 1e de 9a c8 88 |......6S........|
00000040 3b ff df 07 a2 0d |;.....|
[6ab3 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6ab4 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6ab5 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ab6 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ab7 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[6ab8 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ab9 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[6aba 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[6abb 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d 31 06 cb 0c 84 32 95 5e 38 de cd 0a e0 9e 19 |m1....2.^8......|
00000010 d9 d4 3d 90 d2 48 7a c5 b4 8d 54 a8 2c 5e c0 8b |..=..Hz...T.,^..|
[6abc 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b de 66 06 6f 54 44 50 e8 14 27 de |0D. ..f.oTDP..'.|
00000010 e7 17 ef 92 59 7f de 7b a8 b6 b6 8b 97 5b c6 76 |....Y..{.....[.v|
00000020 30 2e 5a 85 02 20 1e 40 c1 87 4d 3e b6 f0 31 72 |0.Z.. .@..M>..1r|
00000030 32 2d b2 83 2b 84 88 c1 56 18 61 d1 03 a7 f4 3b |2-..+...V.a....;|
00000040 c1 2c 5e 73 34 62 |.,^s4b|
[6abd 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6abe 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6abf 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ac0 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[6ac1 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 b5 48 36 d3 3e 5d 24 26 9f 0b b0 d6 b0 b5 08 |c.H6.>]$&.......|
00000010 bf bf f0 d5 c3 f6 cf c2 c2 a4 3d ac a4 95 d3 e7 |..........=.....|
[6ac2 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 6c 70 a1 0f 61 14 9d fa b1 13 24 |0D. Elp..a.....$|
00000010 09 a9 e7 94 75 a4 90 c3 77 a3 2c 5a 3a a3 6d 01 |....u...w.,Z:.m.|
00000020 f4 ce ac 9c 02 20 2e 55 ca c7 19 c9 00 22 4e 9c |..... .U....."N.|
00000030 b7 12 aa 57 08 67 04 00 cc 93 f8 26 93 43 b7 fb |...W.g.....&.C..|
00000040 d0 bc 49 99 5a fc |..I.Z.|
[6ac3 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[6ac4 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ac5 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[6ac6 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ac7 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6ac8 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6ac9 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6aca 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6acb 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6acc 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6acd 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 e6 8e cf a9 c5 3d 91 6e c4 c4 8d 4b bf e4 3e |......=.n...K..>|
00000010 25 91 6b 7e d2 ab 9f ec b6 cf 49 4b 50 56 3e 3c |%.k~......IKPV><|
[6ace 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 e3 dd 58 44 50 2a 98 ce 2f fa |0E.!....XDP*../.|
00000010 59 61 ad 95 1f c7 6f 41 75 40 1e eb df f8 2e 20 |Ya....oAu@..... |
00000020 5a b4 18 5e f1 02 20 20 f8 10 35 45 58 d5 33 37 |Z..^.. ..5EX.37|
00000030 33 50 f7 f2 9b 5d 84 d1 b7 c7 5b 7d f0 40 7c 2a |3P...]....[}.@|*|
00000040 1b 7c ce 41 a6 87 21 |.|.A..!|
[6acf 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6ad0 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034641d0 gate 1582330566564246300 evaluation starts
[6ad1 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034641d0 signed by 0 principal evaluation starts (used [false])
[6ad2 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034641d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6ad3 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034641d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6ad4 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034641d0 principal evaluation fails
[6ad5 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034641d0 gate 1582330566564246300 evaluation fails
[6ad6 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6ad7 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6ad8 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6ad9 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 e6 8e cf a9 c5 3d 91 6e c4 c4 8d 4b bf e4 3e |......=.n...K..>|
00000010 25 91 6b 7e d2 ab 9f ec b6 cf 49 4b 50 56 3e 3c |%.k~......IKPV><|
[6ada 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 e3 dd 58 44 50 2a 98 ce 2f fa |0E.!....XDP*../.|
00000010 59 61 ad 95 1f c7 6f 41 75 40 1e eb df f8 2e 20 |Ya....oAu@..... |
00000020 5a b4 18 5e f1 02 20 20 f8 10 35 45 58 d5 33 37 |Z..^.. ..5EX.37|
00000030 33 50 f7 f2 9b 5d 84 d1 b7 c7 5b 7d f0 40 7c 2a |3P...]....[}.@|*|
00000040 1b 7c ce 41 a6 87 21 |.|.A..!|
[6adb 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6adc 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003464ad0 gate 1582330566564630900 evaluation starts
[6add 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003464ad0 signed by 0 principal evaluation starts (used [false])
[6ade 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003464ad0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6adf 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003464ad0 principal evaluation succeeds for identity 0
[6ae0 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003464ad0 gate 1582330566564630900 evaluation succeeds
[6ae1 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6ae2 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6ae3 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6ae4 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6ae5 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:81 , Envelope: 83 bytes, Signature: 71 bytes
[6ae6 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ae7 02-22 00:16:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ae8 02-22 00:16:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[6ae9 02-22 00:16:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[6aea 02-22 00:16:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6aeb 02-22 00:16:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[6aec 02-22 00:16:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[6aed 02-22 00:16:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d 31 06 cb 0c 84 32 95 5e 38 de cd 0a e0 9e 19 |m1....2.^8......|
00000010 d9 d4 3d 90 d2 48 7a c5 b4 8d 54 a8 2c 5e c0 8b |..=..Hz...T.,^..|
[6aee 02-22 00:16:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b de 66 06 6f 54 44 50 e8 14 27 de |0D. ..f.oTDP..'.|
00000010 e7 17 ef 92 59 7f de 7b a8 b6 b6 8b 97 5b c6 76 |....Y..{.....[.v|
00000020 30 2e 5a 85 02 20 1e 40 c1 87 4d 3e b6 f0 31 72 |0.Z.. .@..M>..1r|
00000030 32 2d b2 83 2b 84 88 c1 56 18 61 d1 03 a7 f4 3b |2-..+...V.a....;|
00000040 c1 2c 5e 73 34 62 |.,^s4b|
[6aef 02-22 00:16:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6af0 02-22 00:16:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes
[6af1 02-22 00:16:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6af2 02-22 00:16:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[6af3 02-22 00:16:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 b5 48 36 d3 3e 5d 24 26 9f 0b b0 d6 b0 b5 08 |c.H6.>]$&.......|
00000010 bf bf f0 d5 c3 f6 cf c2 c2 a4 3d ac a4 95 d3 e7 |..........=.....|
[6af4 02-22 00:16:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 6c 70 a1 0f 61 14 9d fa b1 13 24 |0D. Elp..a.....$|
00000010 09 a9 e7 94 75 a4 90 c3 77 a3 2c 5a 3a a3 6d 01 |....u...w.,Z:.m.|
00000020 f4 ce ac 9c 02 20 2e 55 ca c7 19 c9 00 22 4e 9c |..... .U....."N.|
00000030 b7 12 aa 57 08 67 04 00 cc 93 f8 26 93 43 b7 fb |...W.g.....&.C..|
00000040 d0 bc 49 99 5a fc |..I.Z.|
[6af5 02-22 00:16:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[6af6 02-22 00:16:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6af7 02-22 00:16:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6af8 02-22 00:16:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[6af9 02-22 00:16:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6afa 02-22 00:16:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[6afb 02-22 00:16:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[6afc 02-22 00:16:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6afd 02-22 00:16:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6afe 02-22 00:16:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6aff 02-22 00:16:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6b00 02-22 00:16:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6b01 02-22 00:16:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6b02 02-22 00:16:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6b03 02-22 00:16:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b a3 59 61 23 bf 06 82 e5 f8 a0 40 db 97 71 aa |;.Ya#......@..q.|
00000010 9e 41 13 01 64 da d2 93 6b c3 30 42 58 e1 a1 35 |.A..d...k.0BX..5|
[6b04 02-22 00:16:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 a4 d9 16 91 5d d2 51 25 72 4b |0E.!......].Q%rK|
00000010 35 28 5b 15 1a c1 ae 63 10 ab 03 a4 ac 08 9a 43 |5([....c.......C|
00000020 c1 a1 34 c1 0d 02 20 75 1a 08 59 7b f6 ba 99 01 |..4... u..Y{....|
00000030 71 ba 03 1d 83 bf 0b 1c d7 87 d9 68 1d 10 96 82 |q..........h....|
00000040 4c ff 92 0c c0 57 0c |L....W.|
[6b05 02-22 00:16:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6b06 02-22 00:16:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348c3b0 gate 1582330566639220100 evaluation starts
[6b07 02-22 00:16:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348c3b0 signed by 0 principal evaluation starts (used [false])
[6b08 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348c3b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6b09 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348c3b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6b0a 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348c3b0 principal evaluation fails
[6b0b 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348c3b0 gate 1582330566639220100 evaluation fails
[6b0c 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6b0d 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6b0e 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6b0f 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b a3 59 61 23 bf 06 82 e5 f8 a0 40 db 97 71 aa |;.Ya#......@..q.|
00000010 9e 41 13 01 64 da d2 93 6b c3 30 42 58 e1 a1 35 |.A..d...k.0BX..5|
[6b10 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 a4 d9 16 91 5d d2 51 25 72 4b |0E.!......].Q%rK|
00000010 35 28 5b 15 1a c1 ae 63 10 ab 03 a4 ac 08 9a 43 |5([....c.......C|
00000020 c1 a1 34 c1 0d 02 20 75 1a 08 59 7b f6 ba 99 01 |..4... u..Y{....|
00000030 71 ba 03 1d 83 bf 0b 1c d7 87 d9 68 1d 10 96 82 |q..........h....|
00000040 4c ff 92 0c c0 57 0c |L....W.|
[6b11 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6b12 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348ccb0 gate 1582330566648046900 evaluation starts
[6b13 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348ccb0 signed by 0 principal evaluation starts (used [false])
[6b14 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348ccb0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6b15 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348ccb0 principal evaluation succeeds for identity 0
[6b16 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348ccb0 gate 1582330566648046900 evaluation succeeds
[6b17 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6b18 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6b19 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6b1a 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6b1b 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes
[6b1c 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes]}
[6b1d 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:79
[6b1e 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:79
[6b1f 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:78 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[6b20 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6b21 02-22 00:16:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6b22 02-22 00:16:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[6b23 02-22 00:16:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b24 02-22 00:16:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b25 02-22 00:16:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b26 02-22 00:16:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[6b27 02-22 00:16:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[6b28 02-22 00:16:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[6b29 02-22 00:16:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6b2a 02-22 00:16:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6b2b 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b2c 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b2d 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[6b2e 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[6b31 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6b2f 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[6b32 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6b30 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[6b33 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6b34 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b35 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b36 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330563468483100 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes to 3 peers
[6b37 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b38 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b39 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330563468483100 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[6b3a 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6b3b 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330563468483100 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[6b3c 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6b3d 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330563468483100 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:5 chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 115 bytes, Signature: 70 bytes
[6b3e 02-22 00:16:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6b3f 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 792 bytes, Signature: 0 bytes
[6b40 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 d6 8a ef 72 7d 47 02 62 6d 3e 40 40 ba 9b 26 |....r}G.bm>@@..&|
00000010 c3 c6 b8 f9 ce 94 c5 f1 69 81 3c e4 a6 a4 49 a3 |........i.<...I.|
[6b41 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 cf 46 28 24 f3 a3 31 76 a2 ac 0d |0D. y.F($..1v...|
00000010 e5 73 6b cd 20 b5 ce b3 4b a7 f0 17 c6 be d4 9b |.sk. ...K.......|
00000020 77 27 09 d7 02 20 17 f2 22 9a d0 1c 40 6e 42 3d |w'... .."...@nB=|
00000030 61 75 74 a9 44 c7 4d b9 35 09 ec 82 6e 41 6e 2a |aut.D.M.5...nAn*|
00000040 ae b0 2a 7a f4 02 |..*z..|
[6b42 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 4d ae 28 6c cb 07 c1 9a 42 a1 2b fe 2c 9e 8d |.M.(l....B.+.,..|
00000010 14 7f 18 ba 01 4d 3a 36 47 07 c7 20 20 7d 73 d2 |.....M:6G.. }s.|
[6b43 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 fe a3 a1 32 e4 0e 38 dd c7 7b 34 |0D. %...2..8..{4|
00000010 6d 5f ca 59 e3 81 7d 69 cc fe ef de 87 2a 81 11 |m_.Y..}i.....*..|
00000020 d3 5e 6f a8 02 20 38 f0 b9 9f cd f1 ad 84 7f 15 |.^o.. 8.........|
00000030 dd 69 68 68 bc ec 6e 9e ed c4 ef d0 01 84 c4 b4 |.ihh..n.........|
00000040 ac c6 e9 a7 80 93 |......|
[6b44 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b45 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b46 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6b47 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6b48 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6b49 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6b4a 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6b4b 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6b4c 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 bd 92 4c a0 8e a3 7a 84 1b b5 cb 6a 4c ff 5f |E..L...z....jL._|
00000010 95 a1 75 21 1d 68 4c 8f aa 31 f9 b2 0f 0b fa fd |..u!.hL..1......|
[6b4d 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 78 01 37 59 83 57 f3 09 69 17 |0E.!..x.7Y.W..i.|
00000010 0c 84 f5 64 b0 3d 84 9c d7 fe e2 f6 9b e2 5d 66 |...d.=........]f|
00000020 e6 7d bc 46 82 02 20 35 a7 2b f8 71 93 b4 90 01 |.}.F.. 5.+.q....|
00000030 15 bc d3 e8 55 be 8c ef 36 ef a5 3b 5b 6e 36 78 |....U...6..;[n6x|
00000040 c4 bd cc d1 92 fa 2e |.......|
[6b4e 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6b4f 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034bf910 gate 1582330566987530000 evaluation starts
[6b50 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034bf910 signed by 0 principal evaluation starts (used [false])
[6b51 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034bf910 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6b52 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034bf910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6b53 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034bf910 principal evaluation fails
[6b54 02-22 00:16:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034bf910 gate 1582330566987530000 evaluation fails
[6b55 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6b56 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6b57 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6b58 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 bd 92 4c a0 8e a3 7a 84 1b b5 cb 6a 4c ff 5f |E..L...z....jL._|
00000010 95 a1 75 21 1d 68 4c 8f aa 31 f9 b2 0f 0b fa fd |..u!.hL..1......|
[6b59 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 78 01 37 59 83 57 f3 09 69 17 |0E.!..x.7Y.W..i.|
00000010 0c 84 f5 64 b0 3d 84 9c d7 fe e2 f6 9b e2 5d 66 |...d.=........]f|
00000020 e6 7d bc 46 82 02 20 35 a7 2b f8 71 93 b4 90 01 |.}.F.. 5.+.q....|
00000030 15 bc d3 e8 55 be 8c ef 36 ef a5 3b 5b 6e 36 78 |....U...6..;[n6x|
00000040 c4 bd cc d1 92 fa 2e |.......|
[6b5a 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6b5b 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d6210 gate 1582330566992882300 evaluation starts
[6b5c 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d6210 signed by 0 principal evaluation starts (used [false])
[6b5d 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d6210 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6b5e 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d6210 principal evaluation succeeds for identity 0
[6b5f 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d6210 gate 1582330566992882300 evaluation succeeds
[6b60 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6b61 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6b62 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6b63 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6b64 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b65 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b66 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6b67 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6b68 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6b69 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6b6a 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6b6b 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6b6c 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3b 50 f2 d6 db 5d 0a 80 bc a1 f0 d9 c2 42 32 |.;P...].......B2|
00000010 09 fa cd 83 26 f0 61 0b 4c d1 f1 13 a7 34 40 5c |....&.a.L....4@\|
[6b6d 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 2b b2 3a 2f 23 ae 8f 9a e0 13 0e |0D. .+.:/#......|
00000010 fa f5 82 37 37 4a 0f ab 0e e7 21 87 7d bf f0 c1 |...77J....!.}...|
00000020 17 0d a5 15 02 20 5e 94 ea 70 56 27 ab 56 e3 42 |..... ^..pV'.V.B|
00000030 69 04 7c c8 be 99 11 13 f0 7b c2 27 0b 3c a5 fe |i.|......{.'.<..|
00000040 75 c8 2c 56 69 6a |u.,Vij|
[6b6e 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6b6f 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d7c70 gate 1582330566993698300 evaluation starts
[6b70 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d7c70 signed by 0 principal evaluation starts (used [false])
[6b71 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d7c70 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6b72 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d7c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6b73 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d7c70 principal evaluation fails
[6b74 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d7c70 gate 1582330566993698300 evaluation fails
[6b75 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6b76 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6b77 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6b78 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3b 50 f2 d6 db 5d 0a 80 bc a1 f0 d9 c2 42 32 |.;P...].......B2|
00000010 09 fa cd 83 26 f0 61 0b 4c d1 f1 13 a7 34 40 5c |....&.a.L....4@\|
[6b79 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 2b b2 3a 2f 23 ae 8f 9a e0 13 0e |0D. .+.:/#......|
00000010 fa f5 82 37 37 4a 0f ab 0e e7 21 87 7d bf f0 c1 |...77J....!.}...|
00000020 17 0d a5 15 02 20 5e 94 ea 70 56 27 ab 56 e3 42 |..... ^..pV'.V.B|
00000030 69 04 7c c8 be 99 11 13 f0 7b c2 27 0b 3c a5 fe |i.|......{.'.<..|
00000040 75 c8 2c 56 69 6a |u.,Vij|
[6b7a 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6b7b 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e6570 gate 1582330566994111900 evaluation starts
[6b7c 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e6570 signed by 0 principal evaluation starts (used [false])
[6b7d 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e6570 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6b7e 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e6570 principal evaluation succeeds for identity 0
[6b7f 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e6570 gate 1582330566994111900 evaluation succeeds
[6b80 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6b81 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6b82 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6b83 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6b84 02-22 00:16:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6b85 02-22 00:16:07.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 792 bytes, Signature: 0 bytes
[6b86 02-22 00:16:07.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b88 02-22 00:16:07.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b89 02-22 00:16:07.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6b87 02-22 00:16:07.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 792 bytes, Signature: 0 bytes
[6b8a 02-22 00:16:07.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6b8b 02-22 00:16:07.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6b8c 02-22 00:16:07.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6b8d 02-22 00:16:07.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6b8e 02-22 00:16:07.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6b8f 02-22 00:16:07.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6b90 02-22 00:16:07.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 bd 92 4c a0 8e a3 7a 84 1b b5 cb 6a 4c ff 5f |E..L...z....jL._|
00000010 95 a1 75 21 1d 68 4c 8f aa 31 f9 b2 0f 0b fa fd |..u!.hL..1......|
[6b91 02-22 00:16:07.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 78 01 37 59 83 57 f3 09 69 17 |0E.!..x.7Y.W..i.|
00000010 0c 84 f5 64 b0 3d 84 9c d7 fe e2 f6 9b e2 5d 66 |...d.=........]f|
00000020 e6 7d bc 46 82 02 20 35 a7 2b f8 71 93 b4 90 01 |.}.F.. 5.+.q....|
00000030 15 bc d3 e8 55 be 8c ef 36 ef a5 3b 5b 6e 36 78 |....U...6..;[n6x|
00000040 c4 bd cc d1 92 fa 2e |.......|
[6b92 02-22 00:16:07.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6b93 02-22 00:16:07.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a37b0 gate 1582330567015818600 evaluation starts
[6b94 02-22 00:16:07.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a37b0 signed by 0 principal evaluation starts (used [false])
[6b95 02-22 00:16:07.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a37b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6b96 02-22 00:16:07.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a37b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6b97 02-22 00:16:07.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a37b0 principal evaluation fails
[6b98 02-22 00:16:07.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a37b0 gate 1582330567015818600 evaluation fails
[6b99 02-22 00:16:07.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6b9a 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6b9b 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6b9c 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 bd 92 4c a0 8e a3 7a 84 1b b5 cb 6a 4c ff 5f |E..L...z....jL._|
00000010 95 a1 75 21 1d 68 4c 8f aa 31 f9 b2 0f 0b fa fd |..u!.hL..1......|
[6b9d 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 78 01 37 59 83 57 f3 09 69 17 |0E.!..x.7Y.W..i.|
00000010 0c 84 f5 64 b0 3d 84 9c d7 fe e2 f6 9b e2 5d 66 |...d.=........]f|
00000020 e6 7d bc 46 82 02 20 35 a7 2b f8 71 93 b4 90 01 |.}.F.. 5.+.q....|
00000030 15 bc d3 e8 55 be 8c ef 36 ef a5 3b 5b 6e 36 78 |....U...6..;[n6x|
00000040 c4 bd cc d1 92 fa 2e |.......|
[6b9e 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6b9f 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035160b0 gate 1582330567020844600 evaluation starts
[6ba0 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035160b0 signed by 0 principal evaluation starts (used [false])
[6ba1 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035160b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6ba2 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035160b0 principal evaluation succeeds for identity 0
[6ba3 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035160b0 gate 1582330567020844600 evaluation succeeds
[6ba4 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6ba5 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6ba6 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6ba7 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6ba8 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 d6 8a ef 72 7d 47 02 62 6d 3e 40 40 ba 9b 26 |....r}G.bm>@@..&|
00000010 c3 c6 b8 f9 ce 94 c5 f1 69 81 3c e4 a6 a4 49 a3 |........i.<...I.|
[6ba9 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 cf 46 28 24 f3 a3 31 76 a2 ac 0d |0D. y.F($..1v...|
00000010 e5 73 6b cd 20 b5 ce b3 4b a7 f0 17 c6 be d4 9b |.sk. ...K.......|
00000020 77 27 09 d7 02 20 17 f2 22 9a d0 1c 40 6e 42 3d |w'... .."...@nB=|
00000030 61 75 74 a9 44 c7 4d b9 35 09 ec 82 6e 41 6e 2a |aut.D.M.5...nAn*|
00000040 ae b0 2a 7a f4 02 |..*z..|
[6baa 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 4d ae 28 6c cb 07 c1 9a 42 a1 2b fe 2c 9e 8d |.M.(l....B.+.,..|
00000010 14 7f 18 ba 01 4d 3a 36 47 07 c7 20 20 7d 73 d2 |.....M:6G.. }s.|
[6bab 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 fe a3 a1 32 e4 0e 38 dd c7 7b 34 |0D. %...2..8..{4|
00000010 6d 5f ca 59 e3 81 7d 69 cc fe ef de 87 2a 81 11 |m_.Y..}i.....*..|
00000020 d3 5e 6f a8 02 20 38 f0 b9 9f cd f1 ad 84 7f 15 |.^o.. 8.........|
00000030 dd 69 68 68 bc ec 6e 9e ed c4 ef d0 01 84 c4 b4 |.ihh..n.........|
00000040 ac c6 e9 a7 80 93 |......|
[6bac 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6bad 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6bae 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6baf 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6bb0 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6bb1 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6bb2 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6bb3 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6bb4 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3b 50 f2 d6 db 5d 0a 80 bc a1 f0 d9 c2 42 32 |.;P...].......B2|
00000010 09 fa cd 83 26 f0 61 0b 4c d1 f1 13 a7 34 40 5c |....&.a.L....4@\|
[6bb5 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 2b b2 3a 2f 23 ae 8f 9a e0 13 0e |0D. .+.:/#......|
00000010 fa f5 82 37 37 4a 0f ab 0e e7 21 87 7d bf f0 c1 |...77J....!.}...|
00000020 17 0d a5 15 02 20 5e 94 ea 70 56 27 ab 56 e3 42 |..... ^..pV'.V.B|
00000030 69 04 7c c8 be 99 11 13 f0 7b c2 27 0b 3c a5 fe |i.|......{.'.<..|
00000040 75 c8 2c 56 69 6a |u.,Vij|
[6bb6 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6bb7 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352e870 gate 1582330567022135200 evaluation starts
[6bb8 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352e870 signed by 0 principal evaluation starts (used [false])
[6bb9 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352e870 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6bba 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352e870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6bbb 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352e870 principal evaluation fails
[6bbc 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352e870 gate 1582330567022135200 evaluation fails
[6bbd 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6bbe 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6bbf 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6bc0 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3b 50 f2 d6 db 5d 0a 80 bc a1 f0 d9 c2 42 32 |.;P...].......B2|
00000010 09 fa cd 83 26 f0 61 0b 4c d1 f1 13 a7 34 40 5c |....&.a.L....4@\|
[6bc1 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 2b b2 3a 2f 23 ae 8f 9a e0 13 0e |0D. .+.:/#......|
00000010 fa f5 82 37 37 4a 0f ab 0e e7 21 87 7d bf f0 c1 |...77J....!.}...|
00000020 17 0d a5 15 02 20 5e 94 ea 70 56 27 ab 56 e3 42 |..... ^..pV'.V.B|
00000030 69 04 7c c8 be 99 11 13 f0 7b c2 27 0b 3c a5 fe |i.|......{.'.<..|
00000040 75 c8 2c 56 69 6a |u.,Vij|
[6bc2 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6bc3 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352f170 gate 1582330567022532300 evaluation starts
[6bc4 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352f170 signed by 0 principal evaluation starts (used [false])
[6bc5 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352f170 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6bc6 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352f170 principal evaluation succeeds for identity 0
[6bc7 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352f170 gate 1582330567022532300 evaluation succeeds
[6bc8 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6bc9 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6bca 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6bcb 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6bcc 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6bcd 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 792 bytes, Signature: 0 bytes
[6bce 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6bcf 02-22 00:16:07.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6bd0 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6bd1 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6bd2 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6bd3 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6bd4 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6bd5 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6bd6 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6bd7 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3b 50 f2 d6 db 5d 0a 80 bc a1 f0 d9 c2 42 32 |.;P...].......B2|
00000010 09 fa cd 83 26 f0 61 0b 4c d1 f1 13 a7 34 40 5c |....&.a.L....4@\|
[6bd8 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 2b b2 3a 2f 23 ae 8f 9a e0 13 0e |0D. .+.:/#......|
00000010 fa f5 82 37 37 4a 0f ab 0e e7 21 87 7d bf f0 c1 |...77J....!.}...|
00000020 17 0d a5 15 02 20 5e 94 ea 70 56 27 ab 56 e3 42 |..... ^..pV'.V.B|
00000030 69 04 7c c8 be 99 11 13 f0 7b c2 27 0b 3c a5 fe |i.|......{.'.<..|
00000040 75 c8 2c 56 69 6a |u.,Vij|
[6bd9 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6bda 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354ce80 gate 1582330567035332300 evaluation starts
[6bdb 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354ce80 signed by 0 principal evaluation starts (used [false])
[6bdc 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354ce80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6bdd 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354ce80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6bde 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354ce80 principal evaluation fails
[6bdf 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354ce80 gate 1582330567035332300 evaluation fails
[6be0 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6be1 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6be2 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6be3 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3b 50 f2 d6 db 5d 0a 80 bc a1 f0 d9 c2 42 32 |.;P...].......B2|
00000010 09 fa cd 83 26 f0 61 0b 4c d1 f1 13 a7 34 40 5c |....&.a.L....4@\|
[6be4 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 2b b2 3a 2f 23 ae 8f 9a e0 13 0e |0D. .+.:/#......|
00000010 fa f5 82 37 37 4a 0f ab 0e e7 21 87 7d bf f0 c1 |...77J....!.}...|
00000020 17 0d a5 15 02 20 5e 94 ea 70 56 27 ab 56 e3 42 |..... ^..pV'.V.B|
00000030 69 04 7c c8 be 99 11 13 f0 7b c2 27 0b 3c a5 fe |i.|......{.'.<..|
00000040 75 c8 2c 56 69 6a |u.,Vij|
[6be5 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6be6 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354d780 gate 1582330567038589300 evaluation starts
[6be7 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354d780 signed by 0 principal evaluation starts (used [false])
[6be8 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354d780 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6be9 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354d780 principal evaluation succeeds for identity 0
[6bea 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354d780 gate 1582330567038589300 evaluation succeeds
[6beb 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6bec 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6bed 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6bee 02-22 00:16:07.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6bef 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 d6 8a ef 72 7d 47 02 62 6d 3e 40 40 ba 9b 26 |....r}G.bm>@@..&|
00000010 c3 c6 b8 f9 ce 94 c5 f1 69 81 3c e4 a6 a4 49 a3 |........i.<...I.|
[6bf0 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 cf 46 28 24 f3 a3 31 76 a2 ac 0d |0D. y.F($..1v...|
00000010 e5 73 6b cd 20 b5 ce b3 4b a7 f0 17 c6 be d4 9b |.sk. ...K.......|
00000020 77 27 09 d7 02 20 17 f2 22 9a d0 1c 40 6e 42 3d |w'... .."...@nB=|
00000030 61 75 74 a9 44 c7 4d b9 35 09 ec 82 6e 41 6e 2a |aut.D.M.5...nAn*|
00000040 ae b0 2a 7a f4 02 |..*z..|
[6bf1 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6bf2 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6bf3 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6bf4 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6bf5 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6bf6 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6bf7 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6bf8 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6bf9 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 bd 92 4c a0 8e a3 7a 84 1b b5 cb 6a 4c ff 5f |E..L...z....jL._|
00000010 95 a1 75 21 1d 68 4c 8f aa 31 f9 b2 0f 0b fa fd |..u!.hL..1......|
[6bfa 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 78 01 37 59 83 57 f3 09 69 17 |0E.!..x.7Y.W..i.|
00000010 0c 84 f5 64 b0 3d 84 9c d7 fe e2 f6 9b e2 5d 66 |...d.=........]f|
00000020 e6 7d bc 46 82 02 20 35 a7 2b f8 71 93 b4 90 01 |.}.F.. 5.+.q....|
00000030 15 bc d3 e8 55 be 8c ef 36 ef a5 3b 5b 6e 36 78 |....U...6..;[n6x|
00000040 c4 bd cc d1 92 fa 2e |.......|
[6bfb 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6bfc 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003561890 gate 1582330567045788900 evaluation starts
[6bfd 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003561890 signed by 0 principal evaluation starts (used [false])
[6bfe 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003561890 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6bff 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003561890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6c00 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003561890 principal evaluation fails
[6c01 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003561890 gate 1582330567045788900 evaluation fails
[6c02 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6c03 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6c04 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6c05 02-22 00:16:07.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 bd 92 4c a0 8e a3 7a 84 1b b5 cb 6a 4c ff 5f |E..L...z....jL._|
00000010 95 a1 75 21 1d 68 4c 8f aa 31 f9 b2 0f 0b fa fd |..u!.hL..1......|
[6c06 02-22 00:16:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 78 01 37 59 83 57 f3 09 69 17 |0E.!..x.7Y.W..i.|
00000010 0c 84 f5 64 b0 3d 84 9c d7 fe e2 f6 9b e2 5d 66 |...d.=........]f|
00000020 e6 7d bc 46 82 02 20 35 a7 2b f8 71 93 b4 90 01 |.}.F.. 5.+.q....|
00000030 15 bc d3 e8 55 be 8c ef 36 ef a5 3b 5b 6e 36 78 |....U...6..;[n6x|
00000040 c4 bd cc d1 92 fa 2e |.......|
[6c07 02-22 00:16:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6c08 02-22 00:16:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357c190 gate 1582330567051576600 evaluation starts
[6c09 02-22 00:16:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357c190 signed by 0 principal evaluation starts (used [false])
[6c0a 02-22 00:16:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357c190 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6c0b 02-22 00:16:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357c190 principal evaluation succeeds for identity 0
[6c0c 02-22 00:16:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357c190 gate 1582330567051576600 evaluation succeeds
[6c0d 02-22 00:16:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6c0e 02-22 00:16:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6c0f 02-22 00:16:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6c10 02-22 00:16:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6c11 02-22 00:16:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 4d ae 28 6c cb 07 c1 9a 42 a1 2b fe 2c 9e 8d |.M.(l....B.+.,..|
00000010 14 7f 18 ba 01 4d 3a 36 47 07 c7 20 20 7d 73 d2 |.....M:6G.. }s.|
[6c12 02-22 00:16:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 fe a3 a1 32 e4 0e 38 dd c7 7b 34 |0D. %...2..8..{4|
00000010 6d 5f ca 59 e3 81 7d 69 cc fe ef de 87 2a 81 11 |m_.Y..}i.....*..|
00000020 d3 5e 6f a8 02 20 38 f0 b9 9f cd f1 ad 84 7f 15 |.^o.. 8.........|
00000030 dd 69 68 68 bc ec 6e 9e ed c4 ef d0 01 84 c4 b4 |.ihh..n.........|
00000040 ac c6 e9 a7 80 93 |......|
[6c13 02-22 00:16:07.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c14 02-22 00:16:07.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c15 02-22 00:16:07.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c16 02-22 00:16:07.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[6c17 02-22 00:16:07.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c18 02-22 00:16:07.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c19 02-22 00:16:07.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3813078863912951484 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[6c1a 02-22 00:16:07.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:3813078863912951484 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[6c1b 02-22 00:16:07.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c1c 02-22 00:16:07.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3813078863912951484 , Msg_type: BLOCK_MSG, digests: [4 1 2 3], Envelope: 45 bytes, Signature: 0 bytes
[6c1d 02-22 00:16:07.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3813078863912951484 , Msg_type: BLOCK_MSG, digests: [4 1 2 3], Envelope: 45 bytes, Signature: 0 bytes
[6c1e 02-22 00:16:07.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c1f 02-22 00:16:07.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[6c20 02-22 00:16:07.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c21 02-22 00:16:07.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c22 02-22 00:16:07.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c23 02-22 00:16:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16630351008120470177 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[6c24 02-22 00:16:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16630351008120470177 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[6c25 02-22 00:16:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 1] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[6c26 02-22 00:16:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c27 02-22 00:16:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[6c28 02-22 00:16:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c29 02-22 00:16:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c2a 02-22 00:16:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c2b 02-22 00:16:07.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6c2c 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6c2d 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[6c2e 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[6c2f 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6c30 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[6c31 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 80 e9 7b b6 2c cb 3f 97 44 94 dd 80 7e f8 47 |...{.,.?.D...~.G|
00000010 54 0f ca e5 55 e8 ca 06 7b 50 b5 59 c5 bf f6 78 |T...U...{P.Y...x|
[6c32 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 0b 42 ed 39 a5 2b 41 52 f4 47 |0E.!...B.9.+AR.G|
00000010 90 19 3c de 93 7e dc 25 0a 02 c7 13 06 00 c9 6c |..<..~.%.......l|
00000020 3b e6 2a 0f 5c 02 20 12 1c 50 90 8b 99 27 bd 6a |;.*.\. ..P...'.j|
00000030 45 ca 82 0b 32 85 e8 03 0a 7c 16 1d 82 34 6a 60 |E...2....|...4j`|
00000040 c8 d3 73 0a af 97 ac |..s....|
[6c33 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6c34 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357df10 gate 1582330568125323100 evaluation starts
[6c35 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357df10 signed by 0 principal evaluation starts (used [false])
[6c36 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357df10 processing identity 0 - &{OrdererMSP 9de2412befbda85787d990eb15cf69142545cfd8abf27ca5a151a46e885ec6cd}
[6c37 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357df10 principal evaluation succeeds for identity 0
[6c38 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357df10 gate 1582330568125323100 evaluation succeeds
[6c39 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[6c3a 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[6c3b 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[6c3c 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[6c3d 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [5] channel=businesschannel
[6c3e 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5]
[6c3f 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks
[6c41 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [5] channel=businesschannel
[6c42 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5730 bytes, seq: 5}, Envelope: 5760 bytes, Signature: 0 bytes to the block puller
[6c43 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5
[6c40 02-22 00:16:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5]
[6c44 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger
[6c45 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer
[6c46 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5]
[6c47 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5]
[6c48 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[6c49 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002d9fa40 env 0xc0052906e0 txn 0
[6c4a 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0052906e0
[6c4b 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\013\010\306\345\301\362\005\020\234\377\242\005\"\017businesschannel*@1f76a0ed7577404cf96faf863ebc8789955936d1a165c3aa732083f574d4184d:\016\022\014\022\n_lifecycle" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXaqnq5GV16yVvuxgw6xr3uLKOdgZjaJ5KL5zoac=\n-----END CERTIFICATE-----\n\022\030\253\315T\225\246\273*\251`\270\325\335U<n\0324\261r\247\317\356\305l"
[6c4c 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3
[6c4d 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[6c4e 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[6c4f 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[6c50 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[6c51 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 48 0c 79 6d d9 80 fb a4 88 f6 d2 48 d5 3d 5e 13 |H.ym.......H.=^.|
00000010 b2 9c 1b 3e 46 46 f1 75 f5 e9 05 1d cb 68 82 73 |...>FF.u.....h.s|
[6c52 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 54 d4 9f 51 b7 8a be e4 0e b6 a3 |0D. $T..Q.......|
00000010 b7 36 b7 ee 3b 2e ec 8c 6a 72 79 b8 1a 3c 09 80 |.6..;...jry..<..|
00000020 20 6c 45 47 02 20 5f 5e f8 ee 7f 57 aa f1 2a 70 | lEG. _^...W..*p|
00000030 59 01 56 1b 35 ef 5b f9 69 8d 76 2e b3 a8 82 c3 |Y.V.5.[.i.v.....|
00000040 89 6e 8b 9e b5 fc |.n....|
[6c53 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[6c54 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0035a7000, header channel_header:"\010\003\032\013\010\306\345\301\362\005\020\234\377\242\005\"\017businesschannel*@1f76a0ed7577404cf96faf863ebc8789955936d1a165c3aa732083f574d4184d:\016\022\014\022\n_lifecycle" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXaqnq5GV16yVvuxgw6xr3uLKOdgZjaJ5KL5zoac=\n-----END CERTIFICATE-----\n\022\030\253\315T\225\246\273*\251`\270\325\335U<n\0324\261r\247\317\356\305l"
[6c55 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions
[6c56 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid
[6c57 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s(<nil>)
[6c58 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[6c59 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [1f76a0ed7577404cf96faf863ebc8789955936d1a165c3aa732083f574d4184d]
[6c5a 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x31, 0x66, 0x37, 0x36, 0x61, 0x30, 0x65, 0x64, 0x37, 0x35, 0x37, 0x37, 0x34, 0x30, 0x34, 0x63, 0x66, 0x39, 0x36, 0x66, 0x61, 0x66, 0x38, 0x36, 0x33, 0x65, 0x62, 0x63, 0x38, 0x37, 0x38, 0x39, 0x39, 0x35, 0x35, 0x39, 0x33, 0x36, 0x64, 0x31, 0x61, 0x31, 0x36, 0x35, 0x63, 0x33, 0x61, 0x61, 0x37, 0x33, 0x32, 0x30, 0x38, 0x33, 0x66, 0x35, 0x37, 0x34, 0x64, 0x34, 0x31, 0x38, 0x34, 0x64}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x31, 0x66, 0x37, 0x36, 0x61, 0x30, 0x65, 0x64, 0x37, 0x35, 0x37, 0x37, 0x34, 0x30, 0x34, 0x63, 0x66, 0x39, 0x36, 0x66, 0x61, 0x66, 0x38, 0x36, 0x33, 0x65, 0x62, 0x63, 0x38, 0x37, 0x38, 0x39, 0x39, 0x35, 0x35, 0x39, 0x33, 0x36, 0x64, 0x31, 0x61, 0x31, 0x36, 0x35, 0x63, 0x33, 0x61, 0x61, 0x37, 0x33, 0x32, 0x30, 0x38, 0x33, 0x66, 0x35, 0x37, 0x34, 0x64, 0x34, 0x31, 0x38, 0x34, 0x64, 0xff}]
[6c5b 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction with plugins
[6c5c 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch starts for bytes 0xc0035a9300
[6c5d 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [2c04f8b8-268e-4ebb-b794-5cad43f9745b]
[6c5e 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [2c04f8b8-268e-4ebb-b794-5cad43f9745b]
[6c5f 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 1f76a0ed7577404cf96faf863ebc8789955936d1a165c3aa732083f574d4184d, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin
[6c60 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [96cd2936-4c74-4be9-a0be-3eac290217dd]
[6c61 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [96cd2936-4c74-4be9-a0be-3eac290217dd]
[6c62 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement ==
[6c63 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6c64 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement ==
[6c65 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 5e 10 56 a3 ae 28 bf c1 19 ab 16 44 06 2c e0 |.^.V..(.....D.,.|
00000010 91 38 87 d1 f9 8f 03 63 56 54 60 20 05 41 b5 2c |.8.....cVT` .A.,|
[6c66 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 13 d4 f1 29 db 71 d3 9f 5a d3 |0E.!.....).q..Z.|
00000010 ad 4c 1e d1 02 b2 7c d9 33 f5 a3 48 34 0e 48 96 |.L....|.3..H4.H.|
00000020 a1 06 15 ed 95 02 20 2c 13 23 31 a3 38 b8 a1 da |...... ,.#1.8...|
00000030 37 d2 6c 61 3d 66 27 8c c5 a4 92 26 69 d1 32 b8 |7.la=f'....&i.2.|
00000040 dc d5 c0 7e 5a 54 8b |...~ZT.|
[6c67 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6c68 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 95 2c e8 20 1a 31 ed f8 84 5a 28 bc b6 8a 67 |=.,. .1...Z(...g|
00000010 ac 11 e3 77 78 16 34 00 68 85 bd 30 30 5f f7 37 |...wx.4.h..00_.7|
[6c69 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 7c 40 e2 50 ae 02 9e 7e 1f 83 77 |0D. S|@.P...~..w|
00000010 2b 5b 41 72 76 ee b8 54 25 3b b5 55 6e 78 c4 5c |+[Arv..T%;.Unx.\|
00000020 d0 04 9c c7 02 20 7c 8c bd 67 d9 60 81 4d 62 39 |..... |..g.`.Mb9|
00000030 3b e7 ca 62 70 ea 44 25 fa a2 a6 86 53 40 60 78 |;..bp.D%....S@`x|
00000040 c1 96 ea 5b 01 06 |...[..|
[6c6a 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 1 validated
[6c6b 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c75c0 gate 1582330568138605000 evaluation starts
[6c6c 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c75c0 signed by 0 principal evaluation starts (used [false false])
[6c6d 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c75c0 processing identity 0 - &{Org1MSP 7d0df2506ac221e9752cec5e841f5c7482dfa0c77748a65771953394012282dd}
[6c6e 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c75c0 principal evaluation succeeds for identity 0
[6c6f 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c75c0 gate 1582330568138605000 evaluation succeeds
[6c70 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement
[6c71 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement
[6c72 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement ==
[6c73 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 5e 10 56 a3 ae 28 bf c1 19 ab 16 44 06 2c e0 |.^.V..(.....D.,.|
00000010 91 38 87 d1 f9 8f 03 63 56 54 60 20 05 41 b5 2c |.8.....cVT` .A.,|
[6c74 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 13 d4 f1 29 db 71 d3 9f 5a d3 |0E.!.....).q..Z.|
00000010 ad 4c 1e d1 02 b2 7c d9 33 f5 a3 48 34 0e 48 96 |.L....|.3..H4.H.|
00000020 a1 06 15 ed 95 02 20 2c 13 23 31 a3 38 b8 a1 da |...... ,.#1.8...|
00000030 37 d2 6c 61 3d 66 27 8c c5 a4 92 26 69 d1 32 b8 |7.la=f'....&i.2.|
00000040 dc d5 c0 7e 5a 54 8b |...~ZT.|
[6c75 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6c76 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 95 2c e8 20 1a 31 ed f8 84 5a 28 bc b6 8a 67 |=.,. .1...Z(...g|
00000010 ac 11 e3 77 78 16 34 00 68 85 bd 30 30 5f f7 37 |...wx.4.h..00_.7|
[6c77 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 7c 40 e2 50 ae 02 9e 7e 1f 83 77 |0D. S|@.P...~..w|
00000010 2b 5b 41 72 76 ee b8 54 25 3b b5 55 6e 78 c4 5c |+[Arv..T%;.Unx.\|
00000020 d0 04 9c c7 02 20 7c 8c bd 67 d9 60 81 4d 62 39 |..... |..g.`.Mb9|
00000030 3b e7 ca 62 70 ea 44 25 fa a2 a6 86 53 40 60 78 |;..bp.D%....S@`x|
00000040 c1 96 ea 5b 01 06 |...[..|
[6c78 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 1 validated
[6c79 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fc540 gate 1582330568139573600 evaluation starts
[6c7a 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fc540 signed by 0 principal evaluation starts (used [false false])
[6c7b 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fc540 processing identity 0 - &{Org1MSP 7d0df2506ac221e9752cec5e841f5c7482dfa0c77748a65771953394012282dd}
[6c7c 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fc540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)
[6c7d 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fc540 processing identity 1 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6c7e 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fc540 principal evaluation succeeds for identity 1
[6c7f 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fc540 gate 1582330568139573600 evaluation succeeds
[6c80 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement
[6c81 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement
[6c82 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/LifecycleEndorsement
[6c83 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement
[6c84 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [1329058a-25f4-44fa-842f-28bf0c764086]
[6c85 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1329058a-25f4-44fa-842f-28bf0c764086]
[6c86 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [cc815333-1990-4a68-a23d-651b41c501c1]
[6c87 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [cc815333-1990-4a68-a23d-651b41c501c1]
[6c88 02-22 00:16:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [29923d02-4891-495a-9423-00ed15915094]
[6c89 02-22 00:16:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [29923d02-4891-495a-9423-00ed15915094]
[6c8a 02-22 00:16:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [b4c1b8e3-f76d-4665-9d4d-dbc7b0528d50]
[6c8b 02-22 00:16:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b4c1b8e3-f76d-4665-9d4d-dbc7b0528d50]
[6c8c 02-22 00:16:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: _lifecycle, tx 0 validation results is: <nil>
[6c8d 02-22 00:16:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 1f76a0ed7577404cf96faf863ebc8789955936d1a165c3aa732083f574d4184d appears to be valid
[6c8e 02-22 00:16:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch completes env bytes 0xc0035a9300
[6c8f 02-22 00:16:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002d9fa40 env 0xc0052906e0 txn 0
[6c90 02-22 00:16:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c92 02-22 00:16:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c91 02-22 00:16:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[6c94 02-22 00:16:08.14 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 15ms
[6c95 02-22 00:16:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU HashedRWSet of tx [1f76a0ed7577404cf96faf863ebc8789955936d1a165c3aa732083f574d4184d], namespace [_lifecycle], collection [_implicit_org_Org1MSP] doesn't contain writes
[6c93 02-22 00:16:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c96 02-22 00:16:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU HashedRWSet of tx [1f76a0ed7577404cf96faf863ebc8789955936d1a165c3aa732083f574d4184d], namespace [_lifecycle], collection [_implicit_org_Org2MSP] doesn't contain writes
[6c98 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[6c99 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 0 private write sets from cache. channel=businesschannel
[6c97 02-22 00:16:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c9a 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from transient store channel=businesschannel
[6c9b 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5730 bytes, seq: 5}, Envelope: 5760 bytes, Signature: 0 bytes to 1 peers
[6c9c 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c9d 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6c9e 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5730 bytes, seq: 5}, Envelope: 5760 bytes, Signature: 0 bytes
[6c9f 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ca0 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [5] channel=businesschannel
[6ca1 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5]
[6ca2 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[6ca3 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[6ca4 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[6ca5 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5]
[6ca6 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[6ca7 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION
[6ca8 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[6ca9 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[6caa 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[6cab 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/metadata/exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[6cac 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[6cad 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[6cae 02-22 00:16:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[6caf 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[6cb0 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[6cb1 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[6cb2 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[6cb3 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[6cb4 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02
[6cb5 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[6cb6 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [1f76a0ed7577404cf96faf863ebc8789955936d1a165c3aa732083f574d4184d] marked as valid by state validator. ContainsPostOrderWrites [false]
[6cb7 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Collections"}:(*internal.keyOps)(0xc00295dc00), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/EndorsementInfo"}:(*internal.keyOps)(0xc00295dc40), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Sequence"}:(*internal.keyOps)(0xc00295dc80), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/ValidationInfo"}:(*internal.keyOps)(0xc00295dcc0), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/metadata/exp02"}:(*internal.keyOps)(0xc00295dd00)}
[6cb8 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[6cb9 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[6cba 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[6cbb 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> INFO Updating cached definition for chaincode 'exp02' on channel 'businesschannel'
<EFBFBD><EFBFBD><EFBFBD>Ժ<EFBFBD> 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D> <09><0F>=<3D>Y\<03><>}<7D>J=<3D>M#d<>
[6cbd 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[6cbe 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[6cbf 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[6cc0 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[6cc1 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><>s5(e<>!<21>,<2C>uݳg<13><><EFBFBD>n<EFBFBD><6E><EFBFBD>,A<>=,<2C>V<EFBFBD>'
[6cc2 02-22 00:16:08.16 UTC] [%{longpkg}] %{callpath} -> INFO Chaincode with package ID 'exp02:4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8' now available on channel businesschannel for chaincode definition exp02:1.0
[6cc3 02-22 00:16:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU processApproveOrDefineEvent() channelID=businesschannel chaincodeName=exp02 cachedChaincode="{sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: () true 0xc003170600 [\ufffd\ufffd\ufffd\ufffd>{\"+\ufffd\u0012\ufffd\ufffd#b\ufffd\u000b\u001f\ufffd\u0013\u0015\ufffdT\ufffdH\ufffd\ufffdW\u0005on\u0019\ufffd \ufffd\ufffd\ufffdh\ufffd-\ufffd\ufffd\ufffdi\ufffdu\ufffdE\ufffd\ufffd\ufffd\ufffd^\ufffd\u0006kꞐ\ufffd\ufffd\ufffd\ufffd\ufffd\u0013\ufffd \ufffd\ufffd\u001f\ufffdR\ufffd\ufffd\ufffd\u0018l\ufffd<k\ufffd\u0006\u000c\ufffdG4\u0015\ufffd\ufffd\u0017\ufffdψ\ufffd\ufffd\ufffd.ܿ \u00194SNrˤ\ufffd\ufffd\u0001s\ufffdp\ufffd\u0015\ufffd\ufffd\ufffdoy\ufffd\u0002\ufffd&\ufffd\ufffdt\ufffd\ufffdZM4 \ufffd\t\u001f\u0008\ufffd\u000f\ufffd=\ufffdY\\\u0003\ufffd\ufffd}\ufffdJ=\ufffdM\u001c#\u001cd\ufffd\r\ufffd\ufffd\ufffdԺ\ufffd]}"
[6cc4 02-22 00:16:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU start container: exp02:4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8
[6cc5 02-22 00:16:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU stopping container id=dev-peer0.org1.example.com-exp02-4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8
[6cc6 02-22 00:16:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU stop container result error="No such container: dev-peer0.org1.example.com-exp02-4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8"
[6cc7 02-22 00:16:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU killing container id=dev-peer0.org1.example.com-exp02-4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8
[6cc8 02-22 00:16:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU kill container result id=dev-peer0.org1.example.com-exp02-4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8 error="No such container: dev-peer0.org1.example.com-exp02-4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8"
[6cc9 02-22 00:16:08.17 UTC] [%{longpkg}] %{callpath} -> DEBU removing container id=dev-peer0.org1.example.com-exp02-4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8
[6cca 02-22 00:16:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU remove container result id=dev-peer0.org1.example.com-exp02-4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8 error="No such container: dev-peer0.org1.example.com-exp02-4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8"
[6ccb 02-22 00:16:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052
[6ccc 02-22 00:16:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env:
CORE_CHAINCODE_ID_NAME=exp02:4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8
CORE_CHAINCODE_LOGGING_LEVEL=info
CORE_CHAINCODE_LOGGING_SHIM=warn
CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}
CORE_PEER_TLS_ENABLED=true
CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key
CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt
CORE_TLS_CLIENT_KEY_FILE=/etc/hyperledger/fabric/client_pem.key
CORE_TLS_CLIENT_CERT_FILE=/etc/hyperledger/fabric/client_pem.crt
CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt
CORE_PEER_LOCALMSPID=Org1MSP
[6ccd 02-22 00:16:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8-c6fa44085d76984cdb63d55a77cdc479608bc5aa3e8d36ba69fdd94becaa2f46 containerID=dev-peer0.org1.example.com-exp02-4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8
[6cce 02-22 00:16:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[6ccf 02-22 00:16:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[6cd0 02-22 00:16:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6cd1 02-22 00:16:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6cd2 02-22 00:16:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6cd3 02-22 00:16:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6cd4 02-22 00:16:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU created container imageID=dev-peer0.org1.example.com-exp02-4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8-c6fa44085d76984cdb63d55a77cdc479608bc5aa3e8d36ba69fdd94becaa2f46 containerID=dev-peer0.org1.example.com-exp02-4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8
[6cd5 02-22 00:16:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar
[6cd6 02-22 00:16:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A7B121408ACB284A6AEA4E4FA15...0F0A0A5F6C6966656379636C65120131
[6cd7 02-22 00:16:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2F30E5485E53776B6599805683F8D6FE3CFC19EBC16C8C217F547EB72AAB39F2
<EFBFBD><EFBFBD><EFBFBD>Ժ<EFBFBD>:exp02 <20><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ:exp02 <20><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>:exp02]})] %!s(*lifecycle.Resources=&{0xc0003d21a0 0xc00034c080 0xc0003451b0 0xc0002704f0}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[xb<78><62><07><>|T)sIO<49><4F>7<<3C><><EFBFBD>J<EFBFBD>H<19><><EFBFBD><EFBFBD><14>:%!s(*lifecycle.LocalChaincode=&{0xc003170600 map[businesschannel:map[exp02:0xc00536ea20]]})] %!s(*lifecycle.EventBroker=&{0xc00034c080 0xc0002cdb20 0xc0003451b0 0xc0002cf170 {0 0} map[]}) %!s(*lifecycle.MetadataManager=&{{0 0} [0x15fb690] map[businesschannel:[]] map[businesschannel:[{exp02 1 [10 40 18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [] 0xc00295df80 true true} {_lifecycle 1 [18 41 47 67 104 97 110 110 101 108 47 65 112 112 108 105 99 97 116 105 111 110 47 76 105 102 101 99 121 99 108 101 69 110 100 111 114 115 101 109 101 110 116] [] <nil> true true}]]}) %!s(*lifecycle.ChaincodeCustodian=&{0xc000340e80 {0 0} [] false})}
[6cd9 02-22 00:16:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc005409e50), (*kvrwset.KVWrite)(0xc005409ea0), (*kvrwset.KVWrite)(0xc005409ef0), (*kvrwset.KVWrite)(0xc005409f40), (*kvrwset.KVWrite)(0xc005409f90)}}
[6cda 02-22 00:16:08.65 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02]
[6cdb 02-22 00:16:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]
[6cdc 02-22 00:16:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000340e40 0x2670c08})}
[6cdd 02-22 00:16:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[6cde 02-22 00:16:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02
[6cdf 02-22 00:16:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000340e40 0x2670c08}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 81 73 77 50 111 117 57 68 113 102 118 107 75 116 105 85 79 90 72 107 108 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 69 121 77 106 103 119 77 68 85 120 77 68 66 97 70 119 48 121 79 84 69 121 77 106 85 119 77 68 85 120 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 73 57 118 88 79 50 100 103 50 111 103 70 10 57 71 55 78 107 116 101 97 74 97 112 121 83 85 54 55 49 82 105 75 99 73 110 78 118 51 79 65 100 73 114 43 120 115 110 49 49 87 102 55 84 77 54 57 52 79 119 55 47 71 87 115 71 85 55 49 111 90 84 90 98 72 102 119 10 105 53 83 102 75 108 97 98 77 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 48 121 52 86 118 99 90 67 76 100 83 112 108 97 104 79 71 75 84 48 53 104 99 74 105 82 85 101 111 113 86 109 69 81 104 87 98 43 112 55 121 78 69 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 72 116 97 113 104 114 57 47 98 120 105 103 67 121 104 117 75 113 89 113 68 122 116 119 51 117 69 49 49 113 117 73 90 55 100 114 107 97 89 47 109 118 81 67 73 71 86 116 105 112 108 43 10 79 56 86 121 56 52 117 108 84 82 108 118 116 97 102 68 53 101 86 74 117 113 54 73 114 80 57 66 114 111 70 120 117 49 68 74 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 179 183 184 118 70 59 160 172 8 127 94 65 226 212 86 227 28 96 8 133 49 250 55 11 53 150 142 239 86 215 172 210 2 32 100 89 81 91 46 235 16 150 255 121 87 170 193 209 185 37 14 142 30 237 8 252 234 108 47 230 40 153 117 116 137 125]} 0x15fb3f0}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc000277da0 0xc000419960 {{0 0} 0 0 0 0} {false}})]}
[6ce0 02-22 00:16:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc000340e40 0x2670c08}) %!s(*confighistory.dbProvider=&{0xc0008fcee0})}
[6ce1 02-22 00:16:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5]
[6ce2 02-22 00:16:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage
[6ce3 02-22 00:16:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store
[6ce4 02-22 00:16:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5]
[6ce5 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5]
[6ce6 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0x1b, 0xe0, 0x55, 0x19, 0xc2, 0x72, 0x69, 0xe9, 0xaa, 0xab, 0x66, 0x9f, 0x44, 0x9, 0xbf, 0x8f, 0x11, 0xb7, 0x7c, 0xcc, 0xd7, 0x50, 0x51, 0xda, 0xd3, 0x25, 0x38, 0xba, 0xbe, 0x72, 0xee, 0x66} txOffsets=
txId=1f76a0ed7577404cf96faf863ebc8789955936d1a165c3aa732083f574d4184d locPointer=offset=70, bytesLength=4720
]
[6ce7 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=87753, bytesLength=4720] for tx ID: [1f76a0ed7577404cf96faf863ebc8789955936d1a165c3aa732083f574d4184d] to txid-index
[6ce8 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=87753, bytesLength=4720] for tx number:[0] ID: [1f76a0ed7577404cf96faf863ebc8789955936d1a165c3aa732083f574d4184d] to blockNumTranNum index
[6ce9 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93435], isChainEmpty=[false], lastBlockNumber=[5]
[6cea 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database
[6ceb 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[6cec 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[6ced 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[6cee 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[6cef 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecyclenamespaces/fields/exp02/EndorsementInfo] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]
[6cf0 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecyclenamespaces/fields/exp02/Sequence] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x53, 0x65, 0x71, 0x75, 0x65, 0x6e, 0x63, 0x65}]
[6cf1 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecyclenamespaces/fields/exp02/ValidationInfo] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]
[6cf2 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecyclenamespaces/metadata/exp02] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32}]
[6cf3 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[d_lifecyclenamespaces/fields/exp02/Collections] key(bytes)=[[]byte{0x64, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]
[6cf4 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Came out of wait. maxAvailaBlockNumber=[5]
[6cf5 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[5752], Going to peek [8] bytes
[6cf6 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[5750], placementInfo={fileNum=[0], startOffset=[87683], bytesOffset=[87685]}
[6cf7 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU blockbytes [5750] read from file [0]
[6cf8 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[6cf9 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6]
[6cfa 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}]
[6cfb 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6]
[6cfc 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[6cfd 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database
[6cfe 02-22 00:16:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions
[6cff 02-22 00:16:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5]
[6d00 02-22 00:16:08.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 517ms (state_validation=502ms block_and_pvtdata_commit=7ms state_commit=2ms) commitHash=[3042868125694b32828a5ed945abbdb34cf0f4684c54d799cda081090f8f63ad]
[6d01 02-22 00:16:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A7B121408ACB284A6AEA4E4FA15...0F0A0A5F6C6966656379636C65120131
[6d02 02-22 00:16:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 673F4F23ACC5C6959B6744A4AEB925C1B4E94AE9A87E10EF0F5736B7ACC6C482
[6d03 02-22 00:16:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU [channel: businesschannel] Delivering block [5] for (0xc0031709c0) for 172.18.0.9:44946
[6d04 02-22 00:16:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s)
[6d05 02-22 00:16:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]
[6d06 02-22 00:16:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6d07 02-22 00:16:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6d08 02-22 00:16:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Context canceled, aborting wait for next block
[6d09 02-22 00:16:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Closing Deliver stream
[6d0a 02-22 00:16:08.75 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2020-02-22T00:16:36.089Z grpc.peer_address=172.18.0.9:44946 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.6602692s
[6d0b 02-22 00:16:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Came out of wait. maxAvailaBlockNumber=[5]
[6d0c 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[6d0d 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d0e 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[6d0f 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[6d10 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 9e 90 f7 a4 01 e5 96 2a 93 93 d2 d8 35 99 7c |{.......*....5.||
00000010 97 03 d7 2f ac 76 76 9c bd 04 0e d3 47 de 82 1c |.../.vv.....G...|
[6d11 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 ac c1 72 e5 6d e1 a7 a7 f0 80 |0E.!....r.m.....|
00000010 3a 35 82 7a 4a 36 e1 01 23 50 0c 91 33 a4 57 72 |:5.zJ6..#P..3.Wr|
00000020 f8 67 1f 1c f9 02 20 3b bc 58 6d 33 f2 b1 4c b0 |.g.... ;.Xm3..L.|
00000030 b1 1d a5 50 a5 6d 8f 9f 5d 0f 4c e6 b6 06 84 53 |...P.m..].L....S|
00000040 5b bc 23 f6 8a 11 f3 |[.#....|
[6d12 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[6d13 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe 7a 85 a6 13 cd f8 d7 c3 d2 30 |0E.!..z........0|
00000010 b9 79 d4 88 51 9b c5 67 6c 4d 4e 74 27 51 3e 5a |.y..Q..glMNt'Q>Z|
00000020 e9 83 ab 78 06 02 20 56 0f b8 83 e7 cd 91 b0 7d |...x.. V.......}|
00000030 d8 bf 3e 5a 44 ec dc a6 62 75 e3 f8 bf 13 9d 23 |..>ZD...bu.....#|
00000040 3f 0e 43 b3 80 49 8c |?.C..I.|
[6d14 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[6d15 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[6d16 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:83
[6d17 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:83
[6d18 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[6d19 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d1a 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d1b 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d1c 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes
[6d1d 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes
[6d1e 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d1f 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes
[6d20 02-22 00:16:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d21 02-22 00:16:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d22 02-22 00:16:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d23 02-22 00:16:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d24 02-22 00:16:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[6d25 02-22 00:16:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d26 02-22 00:16:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[6d27 02-22 00:16:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes
[6d28 02-22 00:16:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d29 02-22 00:16:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes
[6d2a 02-22 00:16:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d2b 02-22 00:16:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes
[6d2c 02-22 00:16:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d2d 02-22 00:16:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes
[6d2e 02-22 00:16:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d2f 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[6d30 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[6d31 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d32 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[6d33 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[6d34 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d35 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6d36 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6d37 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6d38 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6d39 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6d3a 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6d3b 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 53 eb bf 46 c7 84 3f 46 22 d8 fb e9 90 80 81 |`S..F..?F"......|
00000010 8e aa 58 e1 cf 16 e7 93 c0 ad 47 7e 6b 35 12 5f |..X.......G~k5._|
[6d3c 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 a0 5a 55 6e 20 63 5e f0 1c 1a |0E.!...ZUn c^...|
00000010 e6 50 60 40 a2 be 51 46 99 f5 49 54 46 89 60 ee |.P`@..QF..ITF.`.|
00000020 4a ef 71 1a b8 02 20 27 98 16 27 3c 00 7a d1 4e |J.q... '..'<.z.N|
00000030 30 54 2a 6d ad 02 21 f5 d0 e6 21 e0 5f 32 25 60 |0T*m..!...!._2%`|
00000040 71 33 74 10 2d 50 f8 |q3t.-P.|
[6d3d 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6d3e 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bbf40 gate 1582330569259832800 evaluation starts
[6d3f 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bbf40 signed by 0 principal evaluation starts (used [false])
[6d40 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bbf40 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6d41 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bbf40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6d42 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bbf40 principal evaluation fails
[6d43 02-22 00:16:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bbf40 gate 1582330569259832800 evaluation fails
[6d44 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6d45 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6d46 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6d47 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 53 eb bf 46 c7 84 3f 46 22 d8 fb e9 90 80 81 |`S..F..?F"......|
00000010 8e aa 58 e1 cf 16 e7 93 c0 ad 47 7e 6b 35 12 5f |..X.......G~k5._|
[6d48 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 a0 5a 55 6e 20 63 5e f0 1c 1a |0E.!...ZUn c^...|
00000010 e6 50 60 40 a2 be 51 46 99 f5 49 54 46 89 60 ee |.P`@..QF..ITF.`.|
00000020 4a ef 71 1a b8 02 20 27 98 16 27 3c 00 7a d1 4e |J.q... '..'<.z.N|
00000030 30 54 2a 6d ad 02 21 f5 d0 e6 21 e0 5f 32 25 60 |0T*m..!...!._2%`|
00000040 71 33 74 10 2d 50 f8 |q3t.-P.|
[6d49 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6d4a 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f2840 gate 1582330569260228200 evaluation starts
[6d4b 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f2840 signed by 0 principal evaluation starts (used [false])
[6d4c 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f2840 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6d4d 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f2840 principal evaluation succeeds for identity 0
[6d4e 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f2840 gate 1582330569260228200 evaluation succeeds
[6d4f 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6d50 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6d51 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6d52 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6d53 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[6d54 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes]}
[6d55 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:82
[6d56 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:82
[6d57 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:81 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[6d58 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d59 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d5a 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d5b 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d5c 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d5d 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d5e 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d5f 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d60 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d61 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[6d62 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d63 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d64 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[6d65 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[6d66 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d67 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[6d68 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d69 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[6d6a 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d6b 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[6d6c 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d6d 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[6d6e 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d6f 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes
[6d70 02-22 00:16:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d71 02-22 00:16:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[6d72 02-22 00:16:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[6d73 02-22 00:16:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA15101E1801
[6d74 02-22 00:16:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 02EA7C13EB7D3D31CB490CDE83261935A2A5CC0C4D0C65C7A05092548D2125D9
[6d75 02-22 00:16:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[6d76 02-22 00:16:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d77 02-22 00:16:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d78 02-22 00:16:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d79 02-22 00:16:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d7a 02-22 00:16:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:30 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[6d7b 02-22 00:16:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d7c 02-22 00:16:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6d7d 02-22 00:16:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:30 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[6d7e 02-22 00:16:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6d7f 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:44954
[6d80 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel=businesschannel txID=50341037 mspID=Org1MSP
[6d81 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 30 f7 b8 4a 4c 6a 48 6d c3 ea af 47 41 30 a9 0f |0..JLjHm...GA0..|
00000010 69 5f 05 6c f0 b4 61 13 73 8b 42 2a 66 37 92 f5 |i_.l..a.s.B*f7..|
[6d82 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 ea 57 ba b3 42 62 f5 10 1c 82 |0E.!...W..Bb....|
00000010 1e 6a 00 0f 05 da 1d 09 84 0d 37 90 33 f4 d2 cc |.j........7.3...|
00000020 4c 92 94 e5 bb 02 20 2e ba 44 5b b3 85 aa 3c 8c |L..... ..D[...<.|
00000030 8e 4d 67 a7 82 7f 80 4d 9a 3a 3b 0e 65 4d 85 4b |.Mg....M.:;.eM.K|
00000040 a1 9a b2 a6 e1 a4 39 |......9|
[6d83 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel=businesschannel txID=50341037 mspID=Org1MSP
[6d84 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [50341037ca33e5901cf6f292d9a1f9f640abf65cf6d6f2cdbee309f75d6306c4]
[6d85 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x35, 0x30, 0x33, 0x34, 0x31, 0x30, 0x33, 0x37, 0x63, 0x61, 0x33, 0x33, 0x65, 0x35, 0x39, 0x30, 0x31, 0x63, 0x66, 0x36, 0x66, 0x32, 0x39, 0x32, 0x64, 0x39, 0x61, 0x31, 0x66, 0x39, 0x66, 0x36, 0x34, 0x30, 0x61, 0x62, 0x66, 0x36, 0x35, 0x63, 0x66, 0x36, 0x64, 0x36, 0x66, 0x32, 0x63, 0x64, 0x62, 0x65, 0x65, 0x33, 0x30, 0x39, 0x66, 0x37, 0x35, 0x64, 0x36, 0x33, 0x30, 0x36, 0x63, 0x34}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x35, 0x30, 0x33, 0x34, 0x31, 0x30, 0x33, 0x37, 0x63, 0x61, 0x33, 0x33, 0x65, 0x35, 0x39, 0x30, 0x31, 0x63, 0x66, 0x36, 0x66, 0x32, 0x39, 0x32, 0x64, 0x39, 0x61, 0x31, 0x66, 0x39, 0x66, 0x36, 0x34, 0x30, 0x61, 0x62, 0x66, 0x36, 0x35, 0x63, 0x66, 0x36, 0x64, 0x36, 0x66, 0x32, 0x63, 0x64, 0x62, 0x65, 0x65, 0x33, 0x30, 0x39, 0x66, 0x37, 0x35, 0x64, 0x36, 0x33, 0x30, 0x36, 0x63, 0x34, 0xff}]
[6d86 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[6d87 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [50341037ca33e5901cf6f292d9a1f9f640abf65cf6d6f2cdbee309f75d6306c4]
[6d88 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] getting chaincode data for _lifecycle on channel businesschannel
[6d89 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[6d8a 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource _lifecycle/QueryChaincodeDefinition
[6d8b 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers)
[6d8c 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6d8d 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6d8e 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6d8f 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 30 f7 b8 4a 4c 6a 48 6d c3 ea af 47 41 30 a9 0f |0..JLjHm...GA0..|
00000010 69 5f 05 6c f0 b4 61 13 73 8b 42 2a 66 37 92 f5 |i_.l..a.s.B*f7..|
[6d90 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 ea 57 ba b3 42 62 f5 10 1c 82 |0E.!...W..Bb....|
00000010 1e 6a 00 0f 05 da 1d 09 84 0d 37 90 33 f4 d2 cc |.j........7.3...|
00000020 4c 92 94 e5 bb 02 20 2e ba 44 5b b3 85 aa 3c 8c |L..... ..D[...<.|
00000030 8e 4d 67 a7 82 7f 80 4d 9a 3a 3b 0e 65 4d 85 4b |.Mg....M.:;.eM.K|
00000040 a1 9a b2 a6 e1 a4 39 |......9|
[6d91 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6d92 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b480 gate 1582330569558365900 evaluation starts
[6d93 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b480 signed by 0 principal evaluation starts (used [false])
[6d94 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b480 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[6d95 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b480 principal evaluation succeeds for identity 0
[6d96 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b480 gate 1582330569558365900 evaluation succeeds
[6d97 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[6d98 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6d99 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6d9a 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6d9b 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU received invocation of QueryChaincodeDefinition on channel 'businesschannel' for chaincode 'exp02'
[6d9c 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[6d9d 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] handling GET_STATE from chaincode
[6d9e 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel
[6d9f 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[6da0 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Completed GET_STATE. Sending RESPONSE
[6da1 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[6da2 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] handling GET_STATE from chaincode
[6da3 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel
[6da4 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[6da5 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Completed GET_STATE. Sending RESPONSE
[6da6 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[6da7 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] handling GET_STATE from chaincode
[6da8 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] getting state for chaincode _lifecycle, key namespaces/fields/exp02/EndorsementInfo, channel businesschannel
[6da9 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo
[6daa 02-22 00:16:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Completed GET_STATE. Sending RESPONSE
[6dab 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[6dac 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] handling GET_STATE from chaincode
[6dad 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] getting state for chaincode _lifecycle, key namespaces/fields/exp02/ValidationInfo, channel businesschannel
[6dae 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo
[6daf 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Completed GET_STATE. Sending RESPONSE
[6db0 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[6db1 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] handling GET_STATE from chaincode
[6db2 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Collections, channel businesschannel
[6db3 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections
[6db4 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Completed GET_STATE. Sending RESPONSE
[6db5 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> INFO Successfully queried chaincode name 'exp02' with definition {sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: ()},
[6db6 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6db7 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] handling GET_PRIVATE_DATA_HASH from chaincode
[6db8 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel
[6db9 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]
[6dba 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config:<static_collection_config:<name:"_implicit_org_Org1MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org1MSP" > > > maximum_peer_count:1 > > config:<static_collection_config:<name:"_implicit_org_Org2MSP" member_orgs_policy:<signature_policy:<rule:<n_out_of:<n:1 rules:<signed_by:0 > > > identities:<principal:"\n\007Org2MSP" > > > maximum_peer_count:1 > > ]
[6dbb 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[6dbc 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6dbd 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6dbe 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] handling GET_PRIVATE_DATA_HASH from chaincode
[6dbf 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel
[6dc0 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[6dc1 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6dc2 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6dc3 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] handling GET_PRIVATE_DATA_HASH from chaincode
[6dc4 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel
[6dc5 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[6dc6 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6dc7 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6dc8 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] handling GET_PRIVATE_DATA_HASH from chaincode
[6dc9 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel
[6dca 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[6dcb 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6dcc 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6dcd 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] handling GET_PRIVATE_DATA_HASH from chaincode
[6dce 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel
[6dcf 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD><EFBFBD>>{"+<2B><12><>#b<> <1F><15>T<EFBFBD>H<EFBFBD><48>Won<19>
[6dd0 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6dd1 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6dd2 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] handling GET_PRIVATE_DATA_HASH from chaincode
[6dd3 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel
[6dd4 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><EFBFBD>h<EFBFBD>-<2D><><EFBFBD>i<EFBFBD>u<EFBFBD>E<EFBFBD><45><EFBFBD><EFBFBD>^<5E>kꞐ<6B><EA9E90><EFBFBD><EFBFBD><EFBFBD><13>
[6dd5 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6dd6 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6dd7 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] handling GET_PRIVATE_DATA_HASH from chaincode
[6dd8 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel
[6dd9 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=<3D><><1F>R<EFBFBD><52><EFBFBD>l<><k<> <0C>G4<15><><17>ψ<EFBFBD><CF88><EFBFBD>.ܿ
[6dda 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6ddb 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready
[6ddc 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] handling GET_PRIVATE_DATA_HASH from chaincode
[6ddd 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel
[6dde 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ<72><CBA4>s<>p<EFBFBD><15><><EFBFBD>oy<6F><02>&<26><>t<EFBFBD><74>ZM4
[6ddf 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE
[6de0 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[6de1 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU [50341037] notifying Txid:50341037ca33e5901cf6f292d9a1f9f640abf65cf6d6f2cdbee309f75d6306c4, channelID:businesschannel
[6de2 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[6de3 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: _lifecycle duration: 6ms channel=businesschannel txID=50341037
[6de4 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[6de5 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [50341037ca33e5901cf6f292d9a1f9f640abf65cf6d6f2cdbee309f75d6306c4]
[6de6 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU escc for chaincode _lifecycle is escc channel=businesschannel txID=50341037
[6de7 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A203B0F9D4F86618A7357830087A7A7...455254494649434154452D2D2D2D2D0A
[6de8 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E5EA5BD60F5B486688A06D74E238125C50B830692CF2110D4C7FDF663ED3644F
[6de9 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [50341037ca33e5901cf6f292d9a1f9f640abf65cf6d6f2cdbee309f75d6306c4]
[6dea 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44954 grpc.code=OK grpc.call_duration=8.2708ms
[6deb 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6dec 02-22 00:16:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6ded 02-22 00:16:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15104F
[6dee 02-22 00:16:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A6DD0B76C36731683D3257FF41DF7C4F3AF01BF231B2E00B35E8CC46D650C243
[6def 02-22 00:16:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[6df0 02-22 00:16:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[6df1 02-22 00:16:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[6df2 02-22 00:16:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6df3 02-22 00:16:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6df4 02-22 00:16:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6df5 02-22 00:16:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[6df6 02-22 00:16:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6df7 02-22 00:16:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[6df8 02-22 00:16:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[6df9 02-22 00:16:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[6dfa 02-22 00:16:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6dfb 02-22 00:16:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6dfc 02-22 00:16:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6dfd 02-22 00:16:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[6dfe 02-22 00:16:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6dff 02-22 00:16:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[6e00 02-22 00:16:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e01 02-22 00:16:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[6e02 02-22 00:16:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[6e03 02-22 00:16:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 dd 0b 76 c3 67 31 68 3d 32 57 ff 41 df 7c 4f |...v.g1h=2W.A.|O|
00000010 3a f0 1b f2 31 b2 e0 0b 35 e8 cc 46 d6 50 c2 43 |:...1...5..F.P.C|
[6e04 02-22 00:16:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 17 c5 65 59 c5 40 4e 16 54 a1 bf db |0D. ..eY.@N.T...|
00000010 3e 7f bc f2 f4 09 68 7d 38 10 57 b5 4b 89 ec d0 |>.....h}8.W.K...|
00000020 7b 24 d2 2b 02 20 45 7f 52 77 c0 cf 80 7a 23 18 |{$.+. E.Rw...z#.|
00000030 d6 e5 e2 20 dc a9 5f 99 93 d7 45 8c 84 5e 5c 21 |... .._...E..^\!|
00000040 c7 9f a2 1c f7 b1 |......|
[6e05 02-22 00:16:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:79 , Envelope: 83 bytes, Signature: 70 bytes
[6e06 02-22 00:16:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e07 02-22 00:16:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[6e08 02-22 00:16:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e09 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[6e0a 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[6e0b 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e0c 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6e0d 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6e0e 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6e0f 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6e10 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6e11 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6e12 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 47 9c a8 2d d7 e6 96 32 63 46 f9 dd 7e d2 e8 |cG..-...2cF..~..|
00000010 45 50 4e fa a5 ac ea 65 c3 ac eb c5 46 dc 9a 03 |EPN....e....F...|
[6e13 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 28 15 fe 2c 9f b4 84 92 3e 44 22 |0D. '(..,....>D"|
00000010 6d 12 68 88 01 f9 c2 e4 12 52 87 2c 9e 2d a8 cc |m.h......R.,.-..|
00000020 7c e9 e6 e7 02 20 18 1e bd 19 f8 37 52 a5 f6 9f ||.... .....7R...|
00000030 c6 15 79 70 ba 3d 58 2a 16 4d 2f bc 3f f0 b5 a9 |..yp.=X*.M/.?...|
00000040 d3 30 65 2e f6 60 |.0e..`|
[6e14 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6e15 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6e470 gate 1582330570150982100 evaluation starts
[6e16 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6e470 signed by 0 principal evaluation starts (used [false])
[6e17 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6e470 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6e18 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6e470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6e19 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6e470 principal evaluation fails
[6e1a 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6e470 gate 1582330570150982100 evaluation fails
[6e1b 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6e1c 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6e1d 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6e1e 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 47 9c a8 2d d7 e6 96 32 63 46 f9 dd 7e d2 e8 |cG..-...2cF..~..|
00000010 45 50 4e fa a5 ac ea 65 c3 ac eb c5 46 dc 9a 03 |EPN....e....F...|
[6e1f 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 28 15 fe 2c 9f b4 84 92 3e 44 22 |0D. '(..,....>D"|
00000010 6d 12 68 88 01 f9 c2 e4 12 52 87 2c 9e 2d a8 cc |m.h......R.,.-..|
00000020 7c e9 e6 e7 02 20 18 1e bd 19 f8 37 52 a5 f6 9f ||.... .....7R...|
00000030 c6 15 79 70 ba 3d 58 2a 16 4d 2f bc 3f f0 b5 a9 |..yp.=X*.M/.?...|
00000040 d3 30 65 2e f6 60 |.0e..`|
[6e20 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6e21 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6ed70 gate 1582330570151415400 evaluation starts
[6e22 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6ed70 signed by 0 principal evaluation starts (used [false])
[6e23 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6ed70 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6e24 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6ed70 principal evaluation succeeds for identity 0
[6e25 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6ed70 gate 1582330570151415400 evaluation succeeds
[6e26 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6e27 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6e28 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6e29 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6e2a 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[6e2b 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes]}
[6e2c 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:80
[6e2d 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:80
[6e2e 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:79 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[6e2f 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e30 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e31 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e32 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[6e33 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[6e34 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e35 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[6e36 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e37 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e38 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e39 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e3a 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e3b 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e3c 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e3d 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[6e3e 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e3f 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e40 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[6e41 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[6e42 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[6e43 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e44 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e45 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[6e46 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e47 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes
[6e48 02-22 00:16:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e49 02-22 00:16:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:4617913783286757682 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6e4a 02-22 00:16:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:4617913783286757682 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6e4b 02-22 00:16:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e4c 02-22 00:16:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e4d 02-22 00:16:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e4e 02-22 00:16:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e4f 02-22 00:16:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e50 02-22 00:16:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e51 02-22 00:16:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[6e52 02-22 00:16:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e53 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[6e54 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e55 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[6e56 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[6e57 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 25 a4 73 25 55 53 c4 62 4f 86 86 02 e1 13 f6 |e%.s%US.bO......|
00000010 c6 5a 18 2c ed 18 03 00 91 35 6f 88 ab 65 19 eb |.Z.,.....5o..e..|
[6e58 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 15 e2 9d 5d c5 78 90 1f 35 17 0d |0D. D...].x..5..|
00000010 72 ca d4 aa 3e bb a3 d3 71 f1 23 56 74 9a 3a 83 |r...>...q.#Vt.:.|
00000020 65 49 7f 29 02 20 2d e8 f0 58 32 31 54 67 e6 b8 |eI.). -..X21Tg..|
00000030 24 1e 04 ff cb a6 21 c6 a1 aa 6f 86 5a 63 20 9a |$.....!...o.Zc .|
00000040 34 66 38 b6 35 9b |4f8.5.|
[6e59 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[6e5a 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 62 b8 8e 94 90 9f 8b 4f 51 8f |0E.!..b......OQ.|
00000010 12 ff da 81 30 4e 79 4c 12 77 4c 8b ec fd 3f 46 |....0NyL.wL...?F|
00000020 b9 d6 15 f3 13 02 20 44 79 3d c8 26 13 dc 5d 04 |...... Dy=.&..].|
00000030 b9 03 4d e9 4a 17 e3 5e 5d eb 99 da 9b 1f 57 b4 |..M.J..^].....W.|
00000040 a4 9c 7a e4 26 af d1 |..z.&..|
[6e5b 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[6e5c 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[6e5d 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:84
[6e5e 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:84
[6e5f 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[6e60 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e61 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e62 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e63 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[6e64 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e65 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e66 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[6e67 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[6e68 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[6e69 02-22 00:16:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e6a 02-22 00:16:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:6112562831437768288 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6e6b 02-22 00:16:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:6112562831437768288 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6e6c 02-22 00:16:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[6e6d 02-22 00:16:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e6e 02-22 00:16:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:11714969985921755899 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6e6f 02-22 00:16:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:11714969985921755899 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6e70 02-22 00:16:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:11714969985921755899 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6e71 02-22 00:16:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e72 02-22 00:16:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e73 02-22 00:16:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e74 02-22 00:16:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e75 02-22 00:16:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e76 02-22 00:16:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e77 02-22 00:16:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[6e78 02-22 00:16:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e79 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[6e7a 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:9941305439342350304 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[6e7b 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[6e7c 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10197133748724001790 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[6e7d 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[6e7e 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7871663824356379167 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[6e7f 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7871663824356379167 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[6e80 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e81 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:9941305439342350304 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6e82 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e83 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10197133748724001790 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[6e84 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e85 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9941305439342350304 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[6e86 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9941305439342350304 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[6e87 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9941305439342350304 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[6e88 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e89 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7871663824356379167 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[6e8a 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7871663824356379167 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[6e8b 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e8c 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10197133748724001790 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[6e8d 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10197133748724001790 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[6e8e 02-22 00:16:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e8f 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6e90 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6e91 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6e92 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6e93 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[6e94 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6e95 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6e96 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6e97 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6e98 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6e99 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6e9a 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6e9b 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 9f bb d2 f9 15 2e 91 42 8d 52 26 9e 01 ea e1 |........B.R&....|
00000010 14 f9 de 44 aa 1d 6e f8 b6 9e 58 76 1a 82 1f 12 |...D..n...Xv....|
[6e9c 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 56 68 17 99 c4 eb 36 59 86 34 c5 |0D. &Vh....6Y.4.|
00000010 19 26 42 a5 2d c7 e7 31 5e 46 7e f0 d6 4d 36 61 |.&B.-..1^F~..M6a|
00000020 a4 fa fc 9a 02 20 43 1f bb 56 ad 12 c4 c4 ac 4b |..... C..V.....K|
00000030 a9 9f f0 06 9e 3c ce af 6d be 34 ec da 01 71 5e |.....<..m.4...q^|
00000040 6b b0 d1 02 39 ea |k...9.|
[6e9d 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6e9e 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e880 gate 1582330570455092800 evaluation starts
[6e9f 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e880 signed by 0 principal evaluation starts (used [false])
[6ea0 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e880 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6ea1 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6ea2 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e880 principal evaluation fails
[6ea3 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e880 gate 1582330570455092800 evaluation fails
[6ea4 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6ea5 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6ea6 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6ea7 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 9f bb d2 f9 15 2e 91 42 8d 52 26 9e 01 ea e1 |........B.R&....|
00000010 14 f9 de 44 aa 1d 6e f8 b6 9e 58 76 1a 82 1f 12 |...D..n...Xv....|
[6ea8 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 56 68 17 99 c4 eb 36 59 86 34 c5 |0D. &Vh....6Y.4.|
00000010 19 26 42 a5 2d c7 e7 31 5e 46 7e f0 d6 4d 36 61 |.&B.-..1^F~..M6a|
00000020 a4 fa fc 9a 02 20 43 1f bb 56 ad 12 c4 c4 ac 4b |..... C..V.....K|
00000030 a9 9f f0 06 9e 3c ce af 6d be 34 ec da 01 71 5e |.....<..m.4...q^|
00000040 6b b0 d1 02 39 ea |k...9.|
[6ea9 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6eaa 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9f180 gate 1582330570455499700 evaluation starts
[6eab 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9f180 signed by 0 principal evaluation starts (used [false])
[6eac 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9f180 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6ead 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9f180 principal evaluation succeeds for identity 0
[6eae 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9f180 gate 1582330570455499700 evaluation succeeds
[6eaf 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6eb0 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6eb1 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6eb2 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6eb3 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[6eb4 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes]}
[6eb5 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:83
[6eb6 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:83
[6eb7 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:82 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[6eb8 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6eb9 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6eba 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ebb 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[6ebc 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ebd 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ebe 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ebf 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[6ec0 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[6ec1 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[6ec2 02-22 00:16:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ec3 02-22 00:16:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Started container dev-peer0.org1.example.com-exp02-4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8
[6ec4 02-22 00:16:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151050
[6ec5 02-22 00:16:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 355AF95A85831CA8BFE0454CFBCF2EB2735ACEFAD54D38B6C7D851AF0FC60283
[6ec6 02-22 00:16:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[6ec7 02-22 00:16:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[6ec8 02-22 00:16:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[6ec9 02-22 00:16:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6eca 02-22 00:16:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[6ecb 02-22 00:16:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ecc 02-22 00:16:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[6ecd 02-22 00:16:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[6ece 02-22 00:16:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ecf 02-22 00:16:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[6ed0 02-22 00:16:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ed1 02-22 00:16:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[6ed2 02-22 00:16:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ed3 02-22 00:16:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[6ed4 02-22 00:16:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[6ed5 02-22 00:16:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ed6 02-22 00:16:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[6ed7 02-22 00:16:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[6ed8 02-22 00:16:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 5a f9 5a 85 83 1c a8 bf e0 45 4c fb cf 2e b2 |5Z.Z......EL....|
00000010 73 5a ce fa d5 4d 38 b6 c7 d8 51 af 0f c6 02 83 |sZ...M8...Q.....|
[6ed9 02-22 00:16:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 72 c9 f9 d7 e8 21 eb ac a9 f1 |0E.!..r....!....|
00000010 f5 bd 0e a5 81 16 e3 2b 3a 97 d0 cc 33 07 85 bd |.......+:...3...|
00000020 7b 7d 86 4a 24 02 20 2b d6 c4 80 ea 13 ce df 46 |{}.J$. +.......F|
00000030 c0 43 c5 bf 98 20 fb ca 85 67 eb 0e 44 a4 e8 a4 |.C... ...g..D...|
00000040 fe 9b 34 22 b8 12 c9 |..4"...|
[6eda 02-22 00:16:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6edb 02-22 00:16:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6edc 02-22 00:16:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6edd 02-22 00:16:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[6ede 02-22 00:16:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 25 a4 73 25 55 53 c4 62 4f 86 86 02 e1 13 f6 |e%.s%US.bO......|
00000010 c6 5a 18 2c ed 18 03 00 91 35 6f 88 ab 65 19 eb |.Z.,.....5o..e..|
[6edf 02-22 00:16:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 15 e2 9d 5d c5 78 90 1f 35 17 0d |0D. D...].x..5..|
00000010 72 ca d4 aa 3e bb a3 d3 71 f1 23 56 74 9a 3a 83 |r...>...q.#Vt.:.|
00000020 65 49 7f 29 02 20 2d e8 f0 58 32 31 54 67 e6 b8 |eI.). -..X21Tg..|
00000030 24 1e 04 ff cb a6 21 c6 a1 aa 6f 86 5a 63 20 9a |$.....!...o.Zc .|
00000040 34 66 38 b6 35 9b |4f8.5.|
[6ee0 02-22 00:16:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[6ee1 02-22 00:16:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ee2 02-22 00:16:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ee3 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[6ee4 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ee5 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[6ee6 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[6ee7 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 5a f9 5a 85 83 1c a8 bf e0 45 4c fb cf 2e b2 |5Z.Z......EL....|
00000010 73 5a ce fa d5 4d 38 b6 c7 d8 51 af 0f c6 02 83 |sZ...M8...Q.....|
[6ee8 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 72 c9 f9 d7 e8 21 eb ac a9 f1 |0E.!..r....!....|
00000010 f5 bd 0e a5 81 16 e3 2b 3a 97 d0 cc 33 07 85 bd |.......+:...3...|
00000020 7b 7d 86 4a 24 02 20 2b d6 c4 80 ea 13 ce df 46 |{}.J$. +.......F|
00000030 c0 43 c5 bf 98 20 fb ca 85 67 eb 0e 44 a4 e8 a4 |.C... ...g..D...|
00000040 fe 9b 34 22 b8 12 c9 |..4"...|
[6ee9 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6eea 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes
[6eeb 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6eec 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[6eed 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 25 a4 73 25 55 53 c4 62 4f 86 86 02 e1 13 f6 |e%.s%US.bO......|
00000010 c6 5a 18 2c ed 18 03 00 91 35 6f 88 ab 65 19 eb |.Z.,.....5o..e..|
[6eee 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 15 e2 9d 5d c5 78 90 1f 35 17 0d |0D. D...].x..5..|
00000010 72 ca d4 aa 3e bb a3 d3 71 f1 23 56 74 9a 3a 83 |r...>...q.#Vt.:.|
00000020 65 49 7f 29 02 20 2d e8 f0 58 32 31 54 67 e6 b8 |eI.). -..X21Tg..|
00000030 24 1e 04 ff cb a6 21 c6 a1 aa 6f 86 5a 63 20 9a |$.....!...o.Zc .|
00000040 34 66 38 b6 35 9b |4f8.5.|
[6eef 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[6ef0 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ef1 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[6ef2 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ef3 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6ef4 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6ef5 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6ef6 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6ef7 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6ef8 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6ef9 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 9f bb d2 f9 15 2e 91 42 8d 52 26 9e 01 ea e1 |........B.R&....|
00000010 14 f9 de 44 aa 1d 6e f8 b6 9e 58 76 1a 82 1f 12 |...D..n...Xv....|
[6efa 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 56 68 17 99 c4 eb 36 59 86 34 c5 |0D. &Vh....6Y.4.|
00000010 19 26 42 a5 2d c7 e7 31 5e 46 7e f0 d6 4d 36 61 |.&B.-..1^F~..M6a|
00000020 a4 fa fc 9a 02 20 43 1f bb 56 ad 12 c4 c4 ac 4b |..... C..V.....K|
00000030 a9 9f f0 06 9e 3c ce af 6d be 34 ec da 01 71 5e |.....<..m.4...q^|
00000040 6b b0 d1 02 39 ea |k...9.|
[6efb 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6efc 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c364e0 gate 1582330570578623300 evaluation starts
[6efd 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c364e0 signed by 0 principal evaluation starts (used [false])
[6efe 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c364e0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6eff 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c364e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6f00 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c364e0 principal evaluation fails
[6f01 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[6f02 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c364e0 gate 1582330570578623300 evaluation fails
[6f03 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6f04 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6f05 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6f06 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 9f bb d2 f9 15 2e 91 42 8d 52 26 9e 01 ea e1 |........B.R&....|
00000010 14 f9 de 44 aa 1d 6e f8 b6 9e 58 76 1a 82 1f 12 |...D..n...Xv....|
[6f07 02-22 00:16:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 56 68 17 99 c4 eb 36 59 86 34 c5 |0D. &Vh....6Y.4.|
00000010 19 26 42 a5 2d c7 e7 31 5e 46 7e f0 d6 4d 36 61 |.&B.-..1^F~..M6a|
00000020 a4 fa fc 9a 02 20 43 1f bb 56 ad 12 c4 c4 ac 4b |..... C..V.....K|
00000030 a9 9f f0 06 9e 3c ce af 6d be 34 ec da 01 71 5e |.....<..m.4...q^|
00000040 6b b0 d1 02 39 ea |k...9.|
[6f08 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6f09 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c36de0 gate 1582330570584421300 evaluation starts
[6f0a 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c36de0 signed by 0 principal evaluation starts (used [false])
[6f0b 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c36de0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6f0c 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c36de0 principal evaluation succeeds for identity 0
[6f0d 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c36de0 gate 1582330570584421300 evaluation succeeds
[6f0e 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6f0f 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6f10 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6f11 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6f12 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[6f13 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f14 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f15 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[6f16 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[6f17 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 5a f9 5a 85 83 1c a8 bf e0 45 4c fb cf 2e b2 |5Z.Z......EL....|
00000010 73 5a ce fa d5 4d 38 b6 c7 d8 51 af 0f c6 02 83 |sZ...M8...Q.....|
[6f18 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f19 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 72 c9 f9 d7 e8 21 eb ac a9 f1 |0E.!..r....!....|
00000010 f5 bd 0e a5 81 16 e3 2b 3a 97 d0 cc 33 07 85 bd |.......+:...3...|
00000020 7b 7d 86 4a 24 02 20 2b d6 c4 80 ea 13 ce df 46 |{}.J$. +.......F|
00000030 c0 43 c5 bf 98 20 fb ca 85 67 eb 0e 44 a4 e8 a4 |.C... ...g..D...|
00000040 fe 9b 34 22 b8 12 c9 |..4"...|
[6f1a 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[6f1b 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 92 b4 62 40 aa 60 11 a1 29 ad 36 |0D. o..b@.`..).6|
00000010 3d 9f 0d 79 70 d7 8f 9a 6a 09 db d6 64 b4 7d 3e |=..yp...j...d.}>|
00000020 bf 42 77 16 02 20 30 b6 4c 21 29 1d 11 0b 91 6a |.Bw.. 0.L!)....j|
00000030 e5 48 0d 48 40 cf 29 be cb c1 08 a6 87 80 22 5d |.H.H@.)......."]|
00000040 77 f1 5f 30 e8 65 |w._0.e|
[6f1c 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6f1d 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:80 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[6f1e 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f1f 02-22 00:16:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f20 02-22 00:16:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6f21 02-22 00:16:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f22 02-22 00:16:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[6f23 02-22 00:16:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[6f24 02-22 00:16:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f25 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6f26 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6f27 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6f28 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6f29 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6f2a 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6f2b 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 8d 09 ea 22 73 e3 cc 31 ea c3 6a 16 1d e1 e2 |G..."s..1..j....|
00000010 53 df 68 0e 29 4c a8 5f c5 ae 04 f5 18 33 d3 81 |S.h.)L._.....3..|
[6f2c 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 8c 5e f7 47 21 84 3f f1 ef c7 38 |0D. ..^.G!.?...8|
00000010 9f eb 79 70 50 9e 0b de 01 46 6e 30 b0 4b be f5 |..ypP....Fn0.K..|
00000020 1c e3 04 b8 02 20 7c 3a bc 53 ec ac 43 5b 81 b2 |..... |:.S..C[..|
00000030 21 7e 56 bc 2a d5 ef 23 a0 34 f1 6f b1 73 84 6e |!~V.*..#.4.o.s.n|
00000040 78 71 d9 4a 81 77 |xq.J.w|
[6f2d 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6f2e 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c662a0 gate 1582330570630430500 evaluation starts
[6f2f 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c662a0 signed by 0 principal evaluation starts (used [false])
[6f30 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c662a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6f31 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c662a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6f32 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c662a0 principal evaluation fails
[6f33 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c662a0 gate 1582330570630430500 evaluation fails
[6f34 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6f35 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6f36 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6f37 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 8d 09 ea 22 73 e3 cc 31 ea c3 6a 16 1d e1 e2 |G..."s..1..j....|
00000010 53 df 68 0e 29 4c a8 5f c5 ae 04 f5 18 33 d3 81 |S.h.)L._.....3..|
[6f38 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 8c 5e f7 47 21 84 3f f1 ef c7 38 |0D. ..^.G!.?...8|
00000010 9f eb 79 70 50 9e 0b de 01 46 6e 30 b0 4b be f5 |..ypP....Fn0.K..|
00000020 1c e3 04 b8 02 20 7c 3a bc 53 ec ac 43 5b 81 b2 |..... |:.S..C[..|
00000030 21 7e 56 bc 2a d5 ef 23 a0 34 f1 6f b1 73 84 6e |!~V.*..#.4.o.s.n|
00000040 78 71 d9 4a 81 77 |xq.J.w|
[6f39 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6f3a 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c66ba0 gate 1582330570631618700 evaluation starts
[6f3b 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c66ba0 signed by 0 principal evaluation starts (used [false])
[6f3c 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c66ba0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6f3d 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c66ba0 principal evaluation succeeds for identity 0
[6f3e 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c66ba0 gate 1582330570631618700 evaluation succeeds
[6f3f 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6f40 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6f41 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6f42 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6f43 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes
[6f44 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes]}
[6f45 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:81
[6f46 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:81
[6f47 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:80 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[6f48 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f49 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f4a 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f4b 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[6f4c 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f4d 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f4e 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f4f 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[6f50 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[6f51 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[6f52 02-22 00:16:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f53 02-22 00:16:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode exp02:4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8 's authentication is authorized
[6f54 02-22 00:16:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created
[6f55 02-22 00:16:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created
[6f56 02-22 00:16:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode exp02:4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8
[6f57 02-22 00:16:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = exp02:4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8, sending back REGISTERED
[6f58 02-22 00:16:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for exp02:4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8
[6f59 02-22 00:16:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode exp02:4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8
[6f5a 02-22 00:16:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode exp02:4af59e6f297f1058f752e34d89f5e9d718fd5707c773a9eac3fbc2b911f604c8
[6f5b 02-22 00:16:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete
[6f5c 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:44966
[6f5d 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel=businesschannel txID=30121b6b mspID=Org1MSP
[6f5e 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a8 7c a6 a4 da 5a 60 d2 48 8b cd af 3e 58 da |u.|...Z`.H...>X.|
00000010 81 7e 1e 97 5d b7 db 78 3d 5e de 25 f9 41 90 a0 |.~..]..x=^.%.A..|
[6f5f 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 05 16 d9 a8 36 8d 64 6f 2b 6b |0E.!......6.do+k|
00000010 6b bd fb 7a 8b a5 b0 37 f2 4e 4a 9d 13 69 cf bd |k..z...7.NJ..i..|
00000020 60 8d 85 a7 35 02 20 4a fb 58 54 69 39 fe 19 d7 |`...5. J.XTi9...|
00000030 7a 6e 1a 6d 63 17 47 c4 d0 ff 99 f5 64 4e ca 75 |zn.mc.G.....dN.u|
00000040 f8 dd c7 d0 28 d7 21 |....(.!|
[6f60 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel=businesschannel txID=30121b6b mspID=Org1MSP
[6f61 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [30121b6bd70426a40d0421dab62025ef96c961a31afb9c49f9592a711b2cc3d4]
[6f62 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x33, 0x30, 0x31, 0x32, 0x31, 0x62, 0x36, 0x62, 0x64, 0x37, 0x30, 0x34, 0x32, 0x36, 0x61, 0x34, 0x30, 0x64, 0x30, 0x34, 0x32, 0x31, 0x64, 0x61, 0x62, 0x36, 0x32, 0x30, 0x32, 0x35, 0x65, 0x66, 0x39, 0x36, 0x63, 0x39, 0x36, 0x31, 0x61, 0x33, 0x31, 0x61, 0x66, 0x62, 0x39, 0x63, 0x34, 0x39, 0x66, 0x39, 0x35, 0x39, 0x32, 0x61, 0x37, 0x31, 0x31, 0x62, 0x32, 0x63, 0x63, 0x33, 0x64, 0x34}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x33, 0x30, 0x31, 0x32, 0x31, 0x62, 0x36, 0x62, 0x64, 0x37, 0x30, 0x34, 0x32, 0x36, 0x61, 0x34, 0x30, 0x64, 0x30, 0x34, 0x32, 0x31, 0x64, 0x61, 0x62, 0x36, 0x32, 0x30, 0x32, 0x35, 0x65, 0x66, 0x39, 0x36, 0x63, 0x39, 0x36, 0x31, 0x61, 0x33, 0x31, 0x61, 0x66, 0x62, 0x39, 0x63, 0x34, 0x39, 0x66, 0x39, 0x35, 0x39, 0x32, 0x61, 0x37, 0x31, 0x31, 0x62, 0x32, 0x63, 0x63, 0x33, 0x64, 0x34, 0xff}]
[6f63 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose
[6f64 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[6f65 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[6f66 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6f67 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[6f68 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a8 7c a6 a4 da 5a 60 d2 48 8b cd af 3e 58 da |u.|...Z`.H...>X.|
00000010 81 7e 1e 97 5d b7 db 78 3d 5e de 25 f9 41 90 a0 |.~..]..x=^.%.A..|
[6f69 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 05 16 d9 a8 36 8d 64 6f 2b 6b |0E.!......6.do+k|
00000010 6b bd fb 7a 8b a5 b0 37 f2 4e 4a 9d 13 69 cf bd |k..z...7.NJ..i..|
00000020 60 8d 85 a7 35 02 20 4a fb 58 54 69 39 fe 19 d7 |`...5. J.XTi9...|
00000030 7a 6e 1a 6d 63 17 47 c4 d0 ff 99 f5 64 4e ca 75 |zn.mc.G.....dN.u|
00000040 f8 dd c7 d0 28 d7 21 |....(.!|
[6f6a 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6f6b 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00340 gate 1582330570873736200 evaluation starts
[6f6c 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00340 signed by 0 principal evaluation starts (used [false])
[6f6d 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00340 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[6f6e 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00340 principal evaluation succeeds for identity 0
[6f6f 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00340 gate 1582330570873736200 evaluation succeeds
[6f70 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers
[6f71 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[6f72 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[6f73 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[6f74 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[6f75 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [30121b6bd70426a40d0421dab62025ef96c961a31afb9c49f9592a711b2cc3d4]
[6f76 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[6f77 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU [30121b6b] getting chaincode data for exp02 on channel businesschannel
[6f78 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[6f79 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[6f7a 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[6f7b 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU [30121b6b] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[6f7c 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU [30121b6b] handling PUT_STATE from chaincode
[6f7d 02-22 00:16:10.87 UTC] [%{longpkg}] %{callpath} -> DEBU [30121b6b] Completed PUT_STATE. Sending RESPONSE
[6f7e 02-22 00:16:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU [30121b6b] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[6f7f 02-22 00:16:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU [30121b6b] handling PUT_STATE from chaincode
[6f80 02-22 00:16:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU [30121b6b] Completed PUT_STATE. Sending RESPONSE
[6f81 02-22 00:16:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU [30121b6b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[6f82 02-22 00:16:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU [30121b6b] notifying Txid:30121b6bd70426a40d0421dab62025ef96c961a31afb9c49f9592a711b2cc3d4, channelID:businesschannel
[6f83 02-22 00:16:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[6f84 02-22 00:16:10.88 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: exp02 duration: 6ms channel=businesschannel txID=30121b6b
[6f85 02-22 00:16:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[6f86 02-22 00:16:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [30121b6bd70426a40d0421dab62025ef96c961a31afb9c49f9592a711b2cc3d4]
[6f87 02-22 00:16:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU escc for chaincode exp02 is escc channel=businesschannel txID=30121b6b
[6f88 02-22 00:16:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2018BBFDE27D165EC2CEB16C0F7307...455254494649434154452D2D2D2D2D0A
[6f89 02-22 00:16:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E5BD291AE2632155974D368ECF81243F78E71EC865F687F5BD6643C38F5D9FCF
[6f8a 02-22 00:16:10.88 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [30121b6bd70426a40d0421dab62025ef96c961a31afb9c49f9592a711b2cc3d4]
[6f8b 02-22 00:16:10.88 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44966 grpc.code=OK grpc.call_duration=12.691ms
[6f8c 02-22 00:16:10.90 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6f8d 02-22 00:16:10.90 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[6f8e 02-22 00:16:10.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f8f 02-22 00:16:10.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f90 02-22 00:16:10.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[6f91 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[6f92 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[6f93 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f94 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[6f95 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6f96 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 804 bytes, Signature: 0 bytes
[6f97 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 4d ae 28 6c cb 07 c1 9a 42 a1 2b fe 2c 9e 8d |.M.(l....B.+.,..|
00000010 14 7f 18 ba 01 4d 3a 36 47 07 c7 20 20 7d 73 d2 |.....M:6G.. }s.|
[6f98 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 fe a3 a1 32 e4 0e 38 dd c7 7b 34 |0D. %...2..8..{4|
00000010 6d 5f ca 59 e3 81 7d 69 cc fe ef de 87 2a 81 11 |m_.Y..}i.....*..|
00000020 d3 5e 6f a8 02 20 38 f0 b9 9f cd f1 ad 84 7f 15 |.^o.. 8.........|
00000030 dd 69 68 68 bc ec 6e 9e ed c4 ef d0 01 84 c4 b4 |.ihh..n.........|
00000040 ac c6 e9 a7 80 93 |......|
[6f99 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f9a 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6f9b 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6f9c 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6f9d 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6f9e 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6f9f 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6fa0 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6fa1 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 bd 92 4c a0 8e a3 7a 84 1b b5 cb 6a 4c ff 5f |E..L...z....jL._|
00000010 95 a1 75 21 1d 68 4c 8f aa 31 f9 b2 0f 0b fa fd |..u!.hL..1......|
[6fa2 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 78 01 37 59 83 57 f3 09 69 17 |0E.!..x.7Y.W..i.|
00000010 0c 84 f5 64 b0 3d 84 9c d7 fe e2 f6 9b e2 5d 66 |...d.=........]f|
00000020 e6 7d bc 46 82 02 20 35 a7 2b f8 71 93 b4 90 01 |.}.F.. 5.+.q....|
00000030 15 bc d3 e8 55 be 8c ef 36 ef a5 3b 5b 6e 36 78 |....U...6..;[n6x|
00000040 c4 bd cc d1 92 fa 2e |.......|
[6fa3 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6fa4 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d36cc0 gate 1582330570975789700 evaluation starts
[6fa5 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d36cc0 signed by 0 principal evaluation starts (used [false])
[6fa6 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d36cc0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6fa7 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d36cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6fa8 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d36cc0 principal evaluation fails
[6fa9 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d36cc0 gate 1582330570975789700 evaluation fails
[6faa 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6fab 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6fac 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6fad 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 bd 92 4c a0 8e a3 7a 84 1b b5 cb 6a 4c ff 5f |E..L...z....jL._|
00000010 95 a1 75 21 1d 68 4c 8f aa 31 f9 b2 0f 0b fa fd |..u!.hL..1......|
[6fae 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 78 01 37 59 83 57 f3 09 69 17 |0E.!..x.7Y.W..i.|
00000010 0c 84 f5 64 b0 3d 84 9c d7 fe e2 f6 9b e2 5d 66 |...d.=........]f|
00000020 e6 7d bc 46 82 02 20 35 a7 2b f8 71 93 b4 90 01 |.}.F.. 5.+.q....|
00000030 15 bc d3 e8 55 be 8c ef 36 ef a5 3b 5b 6e 36 78 |....U...6..;[n6x|
00000040 c4 bd cc d1 92 fa 2e |.......|
[6faf 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6fb0 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d375c0 gate 1582330570977239700 evaluation starts
[6fb1 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d375c0 signed by 0 principal evaluation starts (used [false])
[6fb2 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d375c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[6fb3 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d375c0 principal evaluation succeeds for identity 0
[6fb4 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d375c0 gate 1582330570977239700 evaluation succeeds
[6fb5 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6fb6 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6fb7 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6fb8 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6fb9 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6fba 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6fbb 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6fbc 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6fbd 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6fc1 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6fc2 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6fc3 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6fc4 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3b 50 f2 d6 db 5d 0a 80 bc a1 f0 d9 c2 42 32 |.;P...].......B2|
00000010 09 fa cd 83 26 f0 61 0b 4c d1 f1 13 a7 34 40 5c |....&.a.L....4@\|
[6fc5 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 2b b2 3a 2f 23 ae 8f 9a e0 13 0e |0D. .+.:/#......|
00000010 fa f5 82 37 37 4a 0f ab 0e e7 21 87 7d bf f0 c1 |...77J....!.}...|
00000020 17 0d a5 15 02 20 5e 94 ea 70 56 27 ab 56 e3 42 |..... ^..pV'.V.B|
00000030 69 04 7c c8 be 99 11 13 f0 7b c2 27 0b 3c a5 fe |i.|......{.'.<..|
00000040 75 c8 2c 56 69 6a |u.,Vij|
[6fc6 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6fc7 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4f2b0 gate 1582330570983532800 evaluation starts
[6fc8 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4f2b0 signed by 0 principal evaluation starts (used [false])
[6fc9 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4f2b0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6fca 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4f2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[6fcb 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4f2b0 principal evaluation fails
[6fcc 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4f2b0 gate 1582330570983532800 evaluation fails
[6fcd 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[6fce 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6fcf 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[6fd0 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3b 50 f2 d6 db 5d 0a 80 bc a1 f0 d9 c2 42 32 |.;P...].......B2|
00000010 09 fa cd 83 26 f0 61 0b 4c d1 f1 13 a7 34 40 5c |....&.a.L....4@\|
[6fd1 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 2b b2 3a 2f 23 ae 8f 9a e0 13 0e |0D. .+.:/#......|
00000010 fa f5 82 37 37 4a 0f ab 0e e7 21 87 7d bf f0 c1 |...77J....!.}...|
00000020 17 0d a5 15 02 20 5e 94 ea 70 56 27 ab 56 e3 42 |..... ^..pV'.V.B|
00000030 69 04 7c c8 be 99 11 13 f0 7b c2 27 0b 3c a5 fe |i.|......{.'.<..|
00000040 75 c8 2c 56 69 6a |u.,Vij|
[6fd2 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6fd3 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4fbb0 gate 1582330570984097000 evaluation starts
[6fd4 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4fbb0 signed by 0 principal evaluation starts (used [false])
[6fd5 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4fbb0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[6fd6 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4fbb0 principal evaluation succeeds for identity 0
[6fd7 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4fbb0 gate 1582330570984097000 evaluation succeeds
[6fd8 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[6fd9 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[6fda 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6fdb 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6fdc 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 17 67 2f 02 a2 21 b9 54 5c e2 ea 24 f0 2c 37 |..g/..!.T\..$.,7|
00000010 99 4e fc 38 a7 4b bd 3b f6 c2 85 50 6d 2e 0c df |.N.8.K.;...Pm...|
[6fdd 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2d fb 34 83 88 4b 44 e5 60 97 2e f3 |0D. -.4..KD.`...|
00000010 01 6a e1 05 cb 4a cc b6 74 f2 18 69 5b e4 64 1c |.j...J..t..i[.d.|
00000020 fd 5c 0a 4c 02 20 53 fa 77 59 19 f3 ec 93 94 5d |.\.L. S.wY.....]|
00000030 28 51 f2 8b 3d e0 90 f5 7b ec 5f 01 04 de b2 18 |(Q..=...{._.....|
00000040 81 63 fb 3c 3c b4 |.c.<<.|
[6fde 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[6fdf 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[6fe0 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[6fe1 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[6fe2 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[6fbe 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6fbf 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 804 bytes, Signature: 0 bytes
[6fc0 02-22 00:16:10.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6fe3 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 17 67 2f 02 a2 21 b9 54 5c e2 ea 24 f0 2c 37 |..g/..!.T\..$.,7|
00000010 99 4e fc 38 a7 4b bd 3b f6 c2 85 50 6d 2e 0c df |.N.8.K.;...Pm...|
[6fe5 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2d fb 34 83 88 4b 44 e5 60 97 2e f3 |0D. -.4..KD.`...|
00000010 01 6a e1 05 cb 4a cc b6 74 f2 18 69 5b e4 64 1c |.j...J..t..i[.d.|
00000020 fd 5c 0a 4c 02 20 53 fa 77 59 19 f3 ec 93 94 5d |.\.L. S.wY.....]|
00000030 28 51 f2 8b 3d e0 90 f5 7b ec 5f 01 04 de b2 18 |(Q..=...{._.....|
00000040 81 63 fb 3c 3c b4 |.c.<<.|
[6fe4 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6fe6 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[6fe7 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da6f30 gate 1582330570985261900 evaluation starts
[6fe8 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da6f30 signed by 0 principal evaluation starts (used [false])
[6fe9 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da6f30 processing identity 0 - &{Org1MSP 8be655ba89451b517544b2a241617d188129889401e79f0659d7ccb414b44486}
[6fea 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da6f30 principal evaluation succeeds for identity 0
[6feb 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da6f30 gate 1582330570985261900 evaluation succeeds
[6fec 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[6fed 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[6fee 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[6fef 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[6ff0 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ff1 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 804 bytes, Signature: 0 bytes
[6ff2 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ff3 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330568672110500 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes to 3 peers
[6ff4 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 d6 8a ef 72 7d 47 02 62 6d 3e 40 40 ba 9b 26 |....r}G.bm>@@..&|
00000010 c3 c6 b8 f9 ce 94 c5 f1 69 81 3c e4 a6 a4 49 a3 |........i.<...I.|
[6ff5 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 cf 46 28 24 f3 a3 31 76 a2 ac 0d |0D. y.F($..1v...|
00000010 e5 73 6b cd 20 b5 ce b3 4b a7 f0 17 c6 be d4 9b |.sk. ...K.......|
00000020 77 27 09 d7 02 20 17 f2 22 9a d0 1c 40 6e 42 3d |w'... .."...@nB=|
00000030 61 75 74 a9 44 c7 4d b9 35 09 ec 82 6e 41 6e 2a |aut.D.M.5...nAn*|
00000040 ae b0 2a 7a f4 02 |..*z..|
[6ff6 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ff7 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 4d ae 28 6c cb 07 c1 9a 42 a1 2b fe 2c 9e 8d |.M.(l....B.+.,..|
00000010 14 7f 18 ba 01 4d 3a 36 47 07 c7 20 20 7d 73 d2 |.....M:6G.. }s.|
[6ff8 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 fe a3 a1 32 e4 0e 38 dd c7 7b 34 |0D. %...2..8..{4|
00000010 6d 5f ca 59 e3 81 7d 69 cc fe ef de 87 2a 81 11 |m_.Y..}i.....*..|
00000020 d3 5e 6f a8 02 20 38 f0 b9 9f cd f1 ad 84 7f 15 |.^o.. 8.........|
00000030 dd 69 68 68 bc ec 6e 9e ed c4 ef d0 01 84 c4 b4 |.ihh..n.........|
00000040 ac c6 e9 a7 80 93 |......|
[6ff9 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ffb 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330568672110500 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[6ffc 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[6ffa 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ffd 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[6ffe 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[6fff 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7000 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7001 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7002 02-22 00:16:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7003 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7004 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3b 50 f2 d6 db 5d 0a 80 bc a1 f0 d9 c2 42 32 |.;P...].......B2|
00000010 09 fa cd 83 26 f0 61 0b 4c d1 f1 13 a7 34 40 5c |....&.a.L....4@\|
[7005 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 2b b2 3a 2f 23 ae 8f 9a e0 13 0e |0D. .+.:/#......|
00000010 fa f5 82 37 37 4a 0f ab 0e e7 21 87 7d bf f0 c1 |...77J....!.}...|
00000020 17 0d a5 15 02 20 5e 94 ea 70 56 27 ab 56 e3 42 |..... ^..pV'.V.B|
00000030 69 04 7c c8 be 99 11 13 f0 7b c2 27 0b 3c a5 fe |i.|......{.'.<..|
00000040 75 c8 2c 56 69 6a |u.,Vij|
[7006 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7007 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1dce0 gate 1582330570991949300 evaluation starts
[7008 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1dce0 signed by 0 principal evaluation starts (used [false])
[7009 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1dce0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[700a 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330568672110500 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[700c 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1dce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[700d 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[700e 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1dce0 principal evaluation fails
[700f 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1dce0 gate 1582330570991949300 evaluation fails
[700b 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330568672110500 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7010 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7011 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7012 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7013 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7014 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 3b 50 f2 d6 db 5d 0a 80 bc a1 f0 d9 c2 42 32 |.;P...].......B2|
00000010 09 fa cd 83 26 f0 61 0b 4c d1 f1 13 a7 34 40 5c |....&.a.L....4@\|
[7015 02-22 00:16:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 2b b2 3a 2f 23 ae 8f 9a e0 13 0e |0D. .+.:/#......|
00000010 fa f5 82 37 37 4a 0f ab 0e e7 21 87 7d bf f0 c1 |...77J....!.}...|
00000020 17 0d a5 15 02 20 5e 94 ea 70 56 27 ab 56 e3 42 |..... ^..pV'.V.B|
00000030 69 04 7c c8 be 99 11 13 f0 7b c2 27 0b 3c a5 fe |i.|......{.'.<..|
00000040 75 c8 2c 56 69 6a |u.,Vij|
[7016 02-22 00:16:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7017 02-22 00:16:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbd2a0 gate 1582330571024586700 evaluation starts
[7018 02-22 00:16:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbd2a0 signed by 0 principal evaluation starts (used [false])
[7019 02-22 00:16:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbd2a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[701a 02-22 00:16:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbd2a0 principal evaluation succeeds for identity 0
[701b 02-22 00:16:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbd2a0 gate 1582330571024586700 evaluation succeeds
[701c 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[701d 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[701e 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[701f 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7020 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7021 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7022 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7023 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7024 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7025 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7026 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7027 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7028 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 1c c3 c4 11 84 d9 30 09 be d6 d4 aa 14 20 f4 |b......0...... .|
00000010 14 34 28 0e 94 b4 68 b7 f3 5d 26 ee 4d 10 98 9a |.4(...h..]&.M...|
[7029 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 11 b4 0c e4 70 11 a3 ad db 87 |0E.!......p.....|
00000010 5f d1 ce b9 b4 50 d3 d4 06 40 8f c6 aa 6e 48 4c |_....P...@...nHL|
00000020 8d 5e 99 f6 03 02 20 53 0c f0 47 5d 4c d0 cd 43 |.^.... S..G]L..C|
00000030 9c 52 2d f0 02 46 81 79 8b 80 11 3c 48 1a ab bd |.R-..F.y...<H...|
00000040 25 df 22 88 3e 04 a1 |%.".>..|
[702a 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[702b 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df4d10 gate 1582330571038722500 evaluation starts
[702c 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df4d10 signed by 0 principal evaluation starts (used [false])
[702d 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df4d10 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[702e 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df4d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[702f 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df4d10 principal evaluation fails
[7030 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df4d10 gate 1582330571038722500 evaluation fails
[7031 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7032 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7033 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7034 02-22 00:16:11.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 1c c3 c4 11 84 d9 30 09 be d6 d4 aa 14 20 f4 |b......0...... .|
00000010 14 34 28 0e 94 b4 68 b7 f3 5d 26 ee 4d 10 98 9a |.4(...h..]&.M...|
[7035 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 11 b4 0c e4 70 11 a3 ad db 87 |0E.!......p.....|
00000010 5f d1 ce b9 b4 50 d3 d4 06 40 8f c6 aa 6e 48 4c |_....P...@...nHL|
00000020 8d 5e 99 f6 03 02 20 53 0c f0 47 5d 4c d0 cd 43 |.^.... S..G]L..C|
00000030 9c 52 2d f0 02 46 81 79 8b 80 11 3c 48 1a ab bd |.R-..F.y...<H...|
00000040 25 df 22 88 3e 04 a1 |%.".>..|
[7036 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7037 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df5610 gate 1582330571040397400 evaluation starts
[7038 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df5610 signed by 0 principal evaluation starts (used [false])
[7039 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df5610 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[703a 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df5610 principal evaluation succeeds for identity 0
[703b 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df5610 gate 1582330571040397400 evaluation succeeds
[703c 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[703d 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[703e 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[703f 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7040 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7041 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7042 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7043 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7044 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7045 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7046 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 1c c3 c4 11 84 d9 30 09 be d6 d4 aa 14 20 f4 |b......0...... .|
00000010 14 34 28 0e 94 b4 68 b7 f3 5d 26 ee 4d 10 98 9a |.4(...h..]&.M...|
[7047 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 11 b4 0c e4 70 11 a3 ad db 87 |0E.!......p.....|
00000010 5f d1 ce b9 b4 50 d3 d4 06 40 8f c6 aa 6e 48 4c |_....P...@...nHL|
00000020 8d 5e 99 f6 03 02 20 53 0c f0 47 5d 4c d0 cd 43 |.^.... S..G]L..C|
00000030 9c 52 2d f0 02 46 81 79 8b 80 11 3c 48 1a ab bd |.R-..F.y...<H...|
00000040 25 df 22 88 3e 04 a1 |%.".>..|
[7048 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7049 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e103a0 gate 1582330571044111000 evaluation starts
[704a 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e103a0 signed by 0 principal evaluation starts (used [false])
[704b 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e103a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[704c 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e103a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[704d 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e103a0 principal evaluation fails
[704e 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e103a0 gate 1582330571044111000 evaluation fails
[704f 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7050 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7051 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7052 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 1c c3 c4 11 84 d9 30 09 be d6 d4 aa 14 20 f4 |b......0...... .|
00000010 14 34 28 0e 94 b4 68 b7 f3 5d 26 ee 4d 10 98 9a |.4(...h..]&.M...|
[7053 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 11 b4 0c e4 70 11 a3 ad db 87 |0E.!......p.....|
00000010 5f d1 ce b9 b4 50 d3 d4 06 40 8f c6 aa 6e 48 4c |_....P...@...nHL|
00000020 8d 5e 99 f6 03 02 20 53 0c f0 47 5d 4c d0 cd 43 |.^.... S..G]L..C|
00000030 9c 52 2d f0 02 46 81 79 8b 80 11 3c 48 1a ab bd |.R-..F.y...<H...|
00000040 25 df 22 88 3e 04 a1 |%.".>..|
[7054 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7055 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e10ca0 gate 1582330571047213600 evaluation starts
[7056 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e10ca0 signed by 0 principal evaluation starts (used [false])
[7057 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e10ca0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7058 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e10ca0 principal evaluation succeeds for identity 0
[7059 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e10ca0 gate 1582330571047213600 evaluation succeeds
[705a 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[705b 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[705c 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[705d 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[705e 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[705f 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 804 bytes, Signature: 0 bytes
[7060 02-22 00:16:11.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7061 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 d6 8a ef 72 7d 47 02 62 6d 3e 40 40 ba 9b 26 |....r}G.bm>@@..&|
00000010 c3 c6 b8 f9 ce 94 c5 f1 69 81 3c e4 a6 a4 49 a3 |........i.<...I.|
[7062 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 cf 46 28 24 f3 a3 31 76 a2 ac 0d |0D. y.F($..1v...|
00000010 e5 73 6b cd 20 b5 ce b3 4b a7 f0 17 c6 be d4 9b |.sk. ...K.......|
00000020 77 27 09 d7 02 20 17 f2 22 9a d0 1c 40 6e 42 3d |w'... .."...@nB=|
00000030 61 75 74 a9 44 c7 4d b9 35 09 ec 82 6e 41 6e 2a |aut.D.M.5...nAn*|
00000040 ae b0 2a 7a f4 02 |..*z..|
[7063 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7064 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7065 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7066 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7067 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7068 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7069 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[706a 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[706b 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 bd 92 4c a0 8e a3 7a 84 1b b5 cb 6a 4c ff 5f |E..L...z....jL._|
00000010 95 a1 75 21 1d 68 4c 8f aa 31 f9 b2 0f 0b fa fd |..u!.hL..1......|
[706c 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 78 01 37 59 83 57 f3 09 69 17 |0E.!..x.7Y.W..i.|
00000010 0c 84 f5 64 b0 3d 84 9c d7 fe e2 f6 9b e2 5d 66 |...d.=........]f|
00000020 e6 7d bc 46 82 02 20 35 a7 2b f8 71 93 b4 90 01 |.}.F.. 5.+.q....|
00000030 15 bc d3 e8 55 be 8c ef 36 ef a5 3b 5b 6e 36 78 |....U...6..;[n6x|
00000040 c4 bd cc d1 92 fa 2e |.......|
[706d 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[706e 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2f060 gate 1582330571055324500 evaluation starts
[706f 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2f060 signed by 0 principal evaluation starts (used [false])
[7070 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2f060 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7071 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2f060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7072 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2f060 principal evaluation fails
[7073 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2f060 gate 1582330571055324500 evaluation fails
[7074 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7075 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7076 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7077 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 bd 92 4c a0 8e a3 7a 84 1b b5 cb 6a 4c ff 5f |E..L...z....jL._|
00000010 95 a1 75 21 1d 68 4c 8f aa 31 f9 b2 0f 0b fa fd |..u!.hL..1......|
[7078 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 78 01 37 59 83 57 f3 09 69 17 |0E.!..x.7Y.W..i.|
00000010 0c 84 f5 64 b0 3d 84 9c d7 fe e2 f6 9b e2 5d 66 |...d.=........]f|
00000020 e6 7d bc 46 82 02 20 35 a7 2b f8 71 93 b4 90 01 |.}.F.. 5.+.q....|
00000030 15 bc d3 e8 55 be 8c ef 36 ef a5 3b 5b 6e 36 78 |....U...6..;[n6x|
00000040 c4 bd cc d1 92 fa 2e |.......|
[7079 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[707a 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2f960 gate 1582330571058703000 evaluation starts
[707b 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2f960 signed by 0 principal evaluation starts (used [false])
[707c 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2f960 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[707d 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2f960 principal evaluation succeeds for identity 0
[707e 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2f960 gate 1582330571058703000 evaluation succeeds
[707f 02-22 00:16:11.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7080 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7081 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7082 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7083 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 4d ae 28 6c cb 07 c1 9a 42 a1 2b fe 2c 9e 8d |.M.(l....B.+.,..|
00000010 14 7f 18 ba 01 4d 3a 36 47 07 c7 20 20 7d 73 d2 |.....M:6G.. }s.|
[7084 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 fe a3 a1 32 e4 0e 38 dd c7 7b 34 |0D. %...2..8..{4|
00000010 6d 5f ca 59 e3 81 7d 69 cc fe ef de 87 2a 81 11 |m_.Y..}i.....*..|
00000020 d3 5e 6f a8 02 20 38 f0 b9 9f cd f1 ad 84 7f 15 |.^o.. 8.........|
00000030 dd 69 68 68 bc ec 6e 9e ed c4 ef d0 01 84 c4 b4 |.ihh..n.........|
00000040 ac c6 e9 a7 80 93 |......|
[7085 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7086 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7087 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7088 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7089 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[708a 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[708b 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[708c 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[708d 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 7f 21 a2 1c 26 98 e9 ac 86 e9 46 ba 2e a0 6e |..!..&.....F...n|
00000010 e2 27 a0 6b ec 5d 7f 06 3d 12 07 bb bf 3e 34 e4 |.'.k.]..=....>4.|
[708e 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c ab 6d c6 12 35 b6 46 5c 4a 2a d7 |0D. |.m..5.F\J*.|
00000010 f1 36 27 1e 7f 20 5f 19 4b 53 d0 8c d2 23 72 cc |.6'.. _.KS...#r.|
00000020 6e 47 ad 16 02 20 0d 72 f6 b1 3b 26 60 ac b2 32 |nG... .r..;&`..2|
00000030 2f be 30 31 57 6d 64 96 09 92 98 e0 d5 2d bb 01 |/.01Wmd......-..|
00000040 ed c9 00 15 ab 5b |.....[|
[708f 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7090 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e53a80 gate 1582330571068071200 evaluation starts
[7091 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e53a80 signed by 0 principal evaluation starts (used [false])
[7092 02-22 00:16:11.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e53a80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7093 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e53a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7094 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e53a80 principal evaluation fails
[7095 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e53a80 gate 1582330571068071200 evaluation fails
[7096 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7097 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7098 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7099 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 7f 21 a2 1c 26 98 e9 ac 86 e9 46 ba 2e a0 6e |..!..&.....F...n|
00000010 e2 27 a0 6b ec 5d 7f 06 3d 12 07 bb bf 3e 34 e4 |.'.k.]..=....>4.|
[709a 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c ab 6d c6 12 35 b6 46 5c 4a 2a d7 |0D. |.m..5.F\J*.|
00000010 f1 36 27 1e 7f 20 5f 19 4b 53 d0 8c d2 23 72 cc |.6'.. _.KS...#r.|
00000020 6e 47 ad 16 02 20 0d 72 f6 b1 3b 26 60 ac b2 32 |nG... .r..;&`..2|
00000030 2f be 30 31 57 6d 64 96 09 92 98 e0 d5 2d bb 01 |/.01Wmd......-..|
00000040 ed c9 00 15 ab 5b |.....[|
[709b 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[709c 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e64380 gate 1582330571071885800 evaluation starts
[709d 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e64380 signed by 0 principal evaluation starts (used [false])
[709e 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e64380 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[709f 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e64380 principal evaluation succeeds for identity 0
[70a0 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e64380 gate 1582330571071885800 evaluation succeeds
[70a1 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[70a2 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[70a3 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[70a4 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[70a5 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70a6 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[70a7 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[70a8 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[70a9 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[70aa 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[70ab 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 7f 21 a2 1c 26 98 e9 ac 86 e9 46 ba 2e a0 6e |..!..&.....F...n|
00000010 e2 27 a0 6b ec 5d 7f 06 3d 12 07 bb bf 3e 34 e4 |.'.k.]..=....>4.|
[70ac 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c ab 6d c6 12 35 b6 46 5c 4a 2a d7 |0D. |.m..5.F\J*.|
00000010 f1 36 27 1e 7f 20 5f 19 4b 53 d0 8c d2 23 72 cc |.6'.. _.KS...#r.|
00000020 6e 47 ad 16 02 20 0d 72 f6 b1 3b 26 60 ac b2 32 |nG... .r..;&`..2|
00000030 2f be 30 31 57 6d 64 96 09 92 98 e0 d5 2d bb 01 |/.01Wmd......-..|
00000040 ed c9 00 15 ab 5b |.....[|
[70ad 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[70ae 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e65110 gate 1582330571079045000 evaluation starts
[70af 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e65110 signed by 0 principal evaluation starts (used [false])
[70b0 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e65110 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[70b1 02-22 00:16:11.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e65110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[70b2 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e65110 principal evaluation fails
[70b3 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e65110 gate 1582330571079045000 evaluation fails
[70b4 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[70b5 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[70b6 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[70b7 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 7f 21 a2 1c 26 98 e9 ac 86 e9 46 ba 2e a0 6e |..!..&.....F...n|
00000010 e2 27 a0 6b ec 5d 7f 06 3d 12 07 bb bf 3e 34 e4 |.'.k.]..=....>4.|
[70b8 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c ab 6d c6 12 35 b6 46 5c 4a 2a d7 |0D. |.m..5.F\J*.|
00000010 f1 36 27 1e 7f 20 5f 19 4b 53 d0 8c d2 23 72 cc |.6'.. _.KS...#r.|
00000020 6e 47 ad 16 02 20 0d 72 f6 b1 3b 26 60 ac b2 32 |nG... .r..;&`..2|
00000030 2f be 30 31 57 6d 64 96 09 92 98 e0 d5 2d bb 01 |/.01Wmd......-..|
00000040 ed c9 00 15 ab 5b |.....[|
[70b9 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[70ba 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e65a10 gate 1582330571087544900 evaluation starts
[70bb 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e65a10 signed by 0 principal evaluation starts (used [false])
[70bc 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e65a10 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[70bd 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e65a10 principal evaluation succeeds for identity 0
[70be 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e65a10 gate 1582330571087544900 evaluation succeeds
[70bf 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[70c0 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[70c1 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[70c2 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[70c3 02-22 00:16:11.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70c4 02-22 00:16:11.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70c5 02-22 00:16:11.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70c6 02-22 00:16:11.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[70c7 02-22 00:16:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70c8 02-22 00:16:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70c9 02-22 00:16:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12767545551172236652 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[70ca 02-22 00:16:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12767545551172236652 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[70cb 02-22 00:16:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70cc 02-22 00:16:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12767545551172236652 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes
[70cd 02-22 00:16:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12767545551172236652 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes
[70ce 02-22 00:16:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70cf 02-22 00:16:11.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[70d0 02-22 00:16:11.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70d1 02-22 00:16:11.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70d2 02-22 00:16:11.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70d3 02-22 00:16:11.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330568478395500 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[70d4 02-22 00:16:11.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 17 67 2f 02 a2 21 b9 54 5c e2 ea 24 f0 2c 37 |..g/..!.T\..$.,7|
00000010 99 4e fc 38 a7 4b bd 3b f6 c2 85 50 6d 2e 0c df |.N.8.K.;...Pm...|
[70d5 02-22 00:16:11.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2d fb 34 83 88 4b 44 e5 60 97 2e f3 |0D. -.4..KD.`...|
00000010 01 6a e1 05 cb 4a cc b6 74 f2 18 69 5b e4 64 1c |.j...J..t..i[.d.|
00000020 fd 5c 0a 4c 02 20 53 fa 77 59 19 f3 ec 93 94 5d |.\.L. S.wY.....]|
00000030 28 51 f2 8b 3d e0 90 f5 7b ec 5f 01 04 de b2 18 |(Q..=...{._.....|
00000040 81 63 fb 3c 3c b4 |.c.<<.|
[70d6 02-22 00:16:11.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70d7 02-22 00:16:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330568478395500 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[70d8 02-22 00:16:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 17 67 2f 02 a2 21 b9 54 5c e2 ea 24 f0 2c 37 |..g/..!.T\..$.,7|
00000010 99 4e fc 38 a7 4b bd 3b f6 c2 85 50 6d 2e 0c df |.N.8.K.;...Pm...|
[70d9 02-22 00:16:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2d fb 34 83 88 4b 44 e5 60 97 2e f3 |0D. -.4..KD.`...|
00000010 01 6a e1 05 cb 4a cc b6 74 f2 18 69 5b e4 64 1c |.j...J..t..i[.d.|
00000020 fd 5c 0a 4c 02 20 53 fa 77 59 19 f3 ec 93 94 5d |.\.L. S.wY.....]|
00000030 28 51 f2 8b 3d e0 90 f5 7b ec 5f 01 04 de b2 18 |(Q..=...{._.....|
00000040 81 63 fb 3c 3c b4 |.c.<<.|
[70da 02-22 00:16:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70db 02-22 00:16:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70dc 02-22 00:16:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330568478395500 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[70dd 02-22 00:16:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330568478395500 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[70de 02-22 00:16:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 17 67 2f 02 a2 21 b9 54 5c e2 ea 24 f0 2c 37 |..g/..!.T\..$.,7|
00000010 99 4e fc 38 a7 4b bd 3b f6 c2 85 50 6d 2e 0c df |.N.8.K.;...Pm...|
[70df 02-22 00:16:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2d fb 34 83 88 4b 44 e5 60 97 2e f3 |0D. -.4..KD.`...|
00000010 01 6a e1 05 cb 4a cc b6 74 f2 18 69 5b e4 64 1c |.j...J..t..i[.d.|
00000020 fd 5c 0a 4c 02 20 53 fa 77 59 19 f3 ec 93 94 5d |.\.L. S.wY.....]|
00000030 28 51 f2 8b 3d e0 90 f5 7b ec 5f 01 04 de b2 18 |(Q..=...{._.....|
00000040 81 63 fb 3c 3c b4 |.c.<<.|
[70e0 02-22 00:16:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70e1 02-22 00:16:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70e2 02-22 00:16:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5752206087121621875 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[70e3 02-22 00:16:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:5752206087121621875 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[70e4 02-22 00:16:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[70e5 02-22 00:16:11.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70e6 02-22 00:16:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[70e7 02-22 00:16:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70e8 02-22 00:16:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70e9 02-22 00:16:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70ea 02-22 00:16:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[70eb 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330568743787800 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[70ec 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[70ed 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[70ee 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[70ef 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[70f0 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[70f1 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[70f2 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[70f3 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 1c c3 c4 11 84 d9 30 09 be d6 d4 aa 14 20 f4 |b......0...... .|
00000010 14 34 28 0e 94 b4 68 b7 f3 5d 26 ee 4d 10 98 9a |.4(...h..]&.M...|
[70f4 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 11 b4 0c e4 70 11 a3 ad db 87 |0E.!......p.....|
00000010 5f d1 ce b9 b4 50 d3 d4 06 40 8f c6 aa 6e 48 4c |_....P...@...nHL|
00000020 8d 5e 99 f6 03 02 20 53 0c f0 47 5d 4c d0 cd 43 |.^.... S..G]L..C|
00000030 9c 52 2d f0 02 46 81 79 8b 80 11 3c 48 1a ab bd |.R-..F.y...<H...|
00000040 25 df 22 88 3e 04 a1 |%.".>..|
[70f5 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[70f6 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004115290 gate 1582330571915612400 evaluation starts
[70f7 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004115290 signed by 0 principal evaluation starts (used [false])
[70f8 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004115290 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[70f9 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004115290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[70fa 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004115290 principal evaluation fails
[70fb 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004115290 gate 1582330571915612400 evaluation fails
[70fc 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[70fd 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[70fe 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[70ff 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 1c c3 c4 11 84 d9 30 09 be d6 d4 aa 14 20 f4 |b......0...... .|
00000010 14 34 28 0e 94 b4 68 b7 f3 5d 26 ee 4d 10 98 9a |.4(...h..]&.M...|
[7100 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 11 b4 0c e4 70 11 a3 ad db 87 |0E.!......p.....|
00000010 5f d1 ce b9 b4 50 d3 d4 06 40 8f c6 aa 6e 48 4c |_....P...@...nHL|
00000020 8d 5e 99 f6 03 02 20 53 0c f0 47 5d 4c d0 cd 43 |.^.... S..G]L..C|
00000030 9c 52 2d f0 02 46 81 79 8b 80 11 3c 48 1a ab bd |.R-..F.y...<H...|
00000040 25 df 22 88 3e 04 a1 |%.".>..|
[7101 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7102 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004115b90 gate 1582330571917456700 evaluation starts
[7103 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004115b90 signed by 0 principal evaluation starts (used [false])
[7104 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004115b90 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7105 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004115b90 principal evaluation succeeds for identity 0
[7106 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004115b90 gate 1582330571917456700 evaluation succeeds
[7107 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7108 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7109 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[710a 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[710b 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[710c 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[710d 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330568743787800 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[710e 02-22 00:16:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330568743787800 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[710f 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7110 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7111 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7112 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7113 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7114 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7115 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7116 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 1c c3 c4 11 84 d9 30 09 be d6 d4 aa 14 20 f4 |b......0...... .|
00000010 14 34 28 0e 94 b4 68 b7 f3 5d 26 ee 4d 10 98 9a |.4(...h..]&.M...|
[7117 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 11 b4 0c e4 70 11 a3 ad db 87 |0E.!......p.....|
00000010 5f d1 ce b9 b4 50 d3 d4 06 40 8f c6 aa 6e 48 4c |_....P...@...nHL|
00000020 8d 5e 99 f6 03 02 20 53 0c f0 47 5d 4c d0 cd 43 |.^.... S..G]L..C|
00000030 9c 52 2d f0 02 46 81 79 8b 80 11 3c 48 1a ab bd |.R-..F.y...<H...|
00000040 25 df 22 88 3e 04 a1 |%.".>..|
[7118 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7119 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8fa0 gate 1582330571922405500 evaluation starts
[711a 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8fa0 signed by 0 principal evaluation starts (used [false])
[711b 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8fa0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[711c 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[711d 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8fa0 principal evaluation fails
[711e 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8fa0 gate 1582330571922405500 evaluation fails
[711f 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7120 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7121 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7122 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 1c c3 c4 11 84 d9 30 09 be d6 d4 aa 14 20 f4 |b......0...... .|
00000010 14 34 28 0e 94 b4 68 b7 f3 5d 26 ee 4d 10 98 9a |.4(...h..]&.M...|
[7123 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 11 b4 0c e4 70 11 a3 ad db 87 |0E.!......p.....|
00000010 5f d1 ce b9 b4 50 d3 d4 06 40 8f c6 aa 6e 48 4c |_....P...@...nHL|
00000020 8d 5e 99 f6 03 02 20 53 0c f0 47 5d 4c d0 cd 43 |.^.... S..G]L..C|
00000030 9c 52 2d f0 02 46 81 79 8b 80 11 3c 48 1a ab bd |.R-..F.y...<H...|
00000040 25 df 22 88 3e 04 a1 |%.".>..|
[7124 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7125 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b98a0 gate 1582330571922990700 evaluation starts
[7126 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b98a0 signed by 0 principal evaluation starts (used [false])
[7127 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b98a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7128 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b98a0 principal evaluation succeeds for identity 0
[7129 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b98a0 gate 1582330571922990700 evaluation succeeds
[712a 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[712b 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[712c 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[712d 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[712e 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[712f 02-22 00:16:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7130 02-22 00:16:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[7131 02-22 00:16:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[7132 02-22 00:16:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7133 02-22 00:16:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7134 02-22 00:16:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7135 02-22 00:16:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7136 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424343087800 seq_num:1582330568724658700 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[7137 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424343087800 seq_num:1582330568724658700 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7 properties:ledger_height:6 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[7138 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7139 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[713a 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[713b 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[713c 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[713d 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[713e 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[713f 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 7f 21 a2 1c 26 98 e9 ac 86 e9 46 ba 2e a0 6e |..!..&.....F...n|
00000010 e2 27 a0 6b ec 5d 7f 06 3d 12 07 bb bf 3e 34 e4 |.'.k.]..=....>4.|
[7140 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c ab 6d c6 12 35 b6 46 5c 4a 2a d7 |0D. |.m..5.F\J*.|
00000010 f1 36 27 1e 7f 20 5f 19 4b 53 d0 8c d2 23 72 cc |.6'.. _.KS...#r.|
00000020 6e 47 ad 16 02 20 0d 72 f6 b1 3b 26 60 ac b2 32 |nG... .r..;&`..2|
00000030 2f be 30 31 57 6d 64 96 09 92 98 e0 d5 2d bb 01 |/.01Wmd......-..|
00000040 ed c9 00 15 ab 5b |.....[|
[7141 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7142 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b1ee0 gate 1582330572193004000 evaluation starts
[7143 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b1ee0 signed by 0 principal evaluation starts (used [false])
[7144 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b1ee0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7145 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b1ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7146 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b1ee0 principal evaluation fails
[7147 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b1ee0 gate 1582330572193004000 evaluation fails
[7148 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7149 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[714a 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[714b 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 7f 21 a2 1c 26 98 e9 ac 86 e9 46 ba 2e a0 6e |..!..&.....F...n|
00000010 e2 27 a0 6b ec 5d 7f 06 3d 12 07 bb bf 3e 34 e4 |.'.k.]..=....>4.|
[714c 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c ab 6d c6 12 35 b6 46 5c 4a 2a d7 |0D. |.m..5.F\J*.|
00000010 f1 36 27 1e 7f 20 5f 19 4b 53 d0 8c d2 23 72 cc |.6'.. _.KS...#r.|
00000020 6e 47 ad 16 02 20 0d 72 f6 b1 3b 26 60 ac b2 32 |nG... .r..;&`..2|
00000030 2f be 30 31 57 6d 64 96 09 92 98 e0 d5 2d bb 01 |/.01Wmd......-..|
00000040 ed c9 00 15 ab 5b |.....[|
[714d 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[714e 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e47e0 gate 1582330572194976600 evaluation starts
[714f 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e47e0 signed by 0 principal evaluation starts (used [false])
[7150 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e47e0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7151 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e47e0 principal evaluation succeeds for identity 0
[7152 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e47e0 gate 1582330572194976600 evaluation succeeds
[7153 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7154 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7155 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7156 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7157 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7158 02-22 00:16:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7159 02-22 00:16:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[715a 02-22 00:16:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[715b 02-22 00:16:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[715c 02-22 00:16:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[715d 02-22 00:16:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[715e 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 bd b3 f0 ad 22 1a f0 8e 30 9b c8 9f 61 31 53 | ...."...0...a1S|
00000010 2e f7 88 9a 4b d5 38 60 b8 bd 30 57 34 9f a0 88 |....K.8`..0W4...|
[715f 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 2c 26 df e3 b9 5e 8e a8 b2 47 |0E.!..,&...^...G|
00000010 7e aa 24 d4 9f c4 45 ab 4a c1 3e 00 65 92 3f 81 |~.$...E.J.>.e.?.|
00000020 c4 5b fd 23 ff 02 20 68 cd ae 88 9f c7 74 c1 09 |.[.#.. h.....t..|
00000030 a1 17 38 e9 ce a1 96 4d e7 0c 7f 10 5f 61 7d 32 |..8....M...._a}2|
00000040 c1 41 e4 b2 97 6f 1c |.A...o.|
[7160 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7161 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ca720 gate 1582330572911034700 evaluation starts
[7162 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ca720 signed by 0 principal evaluation starts (used [false])
[7163 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ca720 processing identity 0 - &{OrdererMSP 9de2412befbda85787d990eb15cf69142545cfd8abf27ca5a151a46e885ec6cd}
[7164 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ca720 principal evaluation succeeds for identity 0
[7165 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ca720 gate 1582330572911034700 evaluation succeeds
[7166 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[7167 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[7168 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[7169 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[716a 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [6] channel=businesschannel
[716b 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6]
[716c 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks
[716e 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [6] channel=businesschannel
[716d 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6]
[716f 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger
[7170 02-22 00:16:12.91 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer
[7171 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6]
[7172 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6]
[7173 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[7174 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0033783c0 env 0xc004107950 txn 0
[7175 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004107950
[7176 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\312\345\301\362\005\020\230\342\321\236\003\"\017businesschannel*@30121b6bd70426a40d0421dab62025ef96c961a31afb9c49f9592a711b2cc3d4:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXaqnq5GV16yVvuxgw6xr3uLKOdgZjaJ5KL5zoac=\n-----END CERTIFICATE-----\n\022\030\201Z\2548\372\250\244/\337>[\250!\3505/\210aF\316\336\362g)"
[7177 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3
[7178 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[7179 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[717a 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[717b 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[717c 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba a4 f4 dc d3 56 f0 67 67 15 46 40 af 8b ec 4d |.....V.gg.F@...M|
00000010 9c 4d 9a fb 67 9a 4d a9 75 ac e2 c9 c3 fb af 08 |.M..g.M.u.......|
[717d 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 1e 61 9f b6 9c c0 93 27 53 02 |0E.!...a.....'S.|
00000010 8c 0e f2 91 44 1e 3a d4 47 4a c8 04 3d 94 25 4a |....D.:.GJ..=.%J|
00000020 44 68 dc d8 ef 02 20 36 4e 39 7d b0 47 c3 88 c5 |Dh.... 6N9}.G...|
00000030 a9 a8 e4 43 df 28 2e 64 3e 9a 84 0d dd 82 63 23 |...C.(.d>.....c#|
00000040 2b 1c 12 61 0d ce da |+..a...|
[717e 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[717f 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc002fbd800, header channel_header:"\010\003\032\014\010\312\345\301\362\005\020\230\342\321\236\003\"\017businesschannel*@30121b6bd70426a40d0421dab62025ef96c961a31afb9c49f9592a711b2cc3d4:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQYQmDCQAwHI0jFExt0EW9ijAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABIy/vTtI3V79\n2rcWfB+nRBVt6ez+Mgz7ZjGmibYIUrH2tBAuomci46aS54r3139Dg6A1Jl8G8nj/\n5qxC2bJ3U/CjTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAINMuFb3GQi3UqZWoThik9OYXCYkVHqKlZhEIVm/qe8jRMAoGCCqGSM49\nBAMCA0gAMEUCIQD51jpG/bmP7/921BpFlVDF10gMYDzARqRbkfv84NM0vwIgIWtC\nXaqnq5GV16yVvuxgw6xr3uLKOdgZjaJ5KL5zoac=\n-----END CERTIFICATE-----\n\022\030\201Z\2548\372\250\244/\337>[\250!\3505/\210aF\316\336\362g)"
[7180 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions
[7181 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid
[7182 02-22 00:16:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s(<nil>)
[7183 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[7184 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [30121b6bd70426a40d0421dab62025ef96c961a31afb9c49f9592a711b2cc3d4]
[7185 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4056 bytes, seq: 6}, Envelope: 4086 bytes, Signature: 0 bytes to the block puller
[7186 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x33, 0x30, 0x31, 0x32, 0x31, 0x62, 0x36, 0x62, 0x64, 0x37, 0x30, 0x34, 0x32, 0x36, 0x61, 0x34, 0x30, 0x64, 0x30, 0x34, 0x32, 0x31, 0x64, 0x61, 0x62, 0x36, 0x32, 0x30, 0x32, 0x35, 0x65, 0x66, 0x39, 0x36, 0x63, 0x39, 0x36, 0x31, 0x61, 0x33, 0x31, 0x61, 0x66, 0x62, 0x39, 0x63, 0x34, 0x39, 0x66, 0x39, 0x35, 0x39, 0x32, 0x61, 0x37, 0x31, 0x31, 0x62, 0x32, 0x63, 0x63, 0x33, 0x64, 0x34}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x33, 0x30, 0x31, 0x32, 0x31, 0x62, 0x36, 0x62, 0x64, 0x37, 0x30, 0x34, 0x32, 0x36, 0x61, 0x34, 0x30, 0x64, 0x30, 0x34, 0x32, 0x31, 0x64, 0x61, 0x62, 0x36, 0x32, 0x30, 0x32, 0x35, 0x65, 0x66, 0x39, 0x36, 0x63, 0x39, 0x36, 0x31, 0x61, 0x33, 0x31, 0x61, 0x66, 0x62, 0x39, 0x63, 0x34, 0x39, 0x66, 0x39, 0x35, 0x39, 0x32, 0x61, 0x37, 0x31, 0x31, 0x62, 0x32, 0x63, 0x63, 0x33, 0x64, 0x34, 0xff}]
[7187 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction with plugins
[7188 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch starts for bytes 0xc00366d800
[7189 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6
[718a 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [13efd6f9-076c-460f-bcfc-313e6914a120]
[718b 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[718c 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[718d 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo
[718e 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo
[718f 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections
[7190 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [13efd6f9-076c-460f-bcfc-313e6914a120]
[7191 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 30121b6bd70426a40d0421dab62025ef96c961a31afb9c49f9592a711b2cc3d4, seq 0 out of 1 in block 6 for channel businesschannel with validation plugin vscc with plugin
[7192 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [82c7cbb2-131c-4491-b49f-4557205259ee]
[7193 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [82c7cbb2-131c-4491-b49f-4557205259ee]
[7194 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 bd 29 1a e2 63 21 55 97 4d 36 8e cf 81 24 3f |..)..c!U.M6...$?|
00000010 78 e7 1e c8 65 f6 87 f5 bd 66 43 c3 8f 5d 9f cf |x...e....fC..]..|
[7195 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 d7 f4 21 bc 8e c1 9e 06 ab f0 b7 |0D. C..!........|
00000010 81 c4 80 dc 30 a8 54 a9 4c 08 c9 00 07 1a 03 3d |....0.T.L......=|
00000020 dd b8 6e 68 02 20 14 b5 07 f7 7f a3 43 68 62 a5 |..nh. ......Chb.|
00000030 cf 8c 69 b7 69 a1 49 7e e9 d3 fc 39 67 a6 46 3c |..i.i.I~...9g.F<|
00000040 93 1e cd 3f 7c 7a |...?|z|
[7196 02-22 00:16:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7197 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460af80 gate 1582330572940663100 evaluation starts
[7198 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460af80 signed by 0 principal evaluation starts (used [false])
[7199 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460af80 processing identity 0 - &{Org1MSP 7d0df2506ac221e9752cec5e841f5c7482dfa0c77748a65771953394012282dd}
[719a 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460af80 principal evaluation succeeds for identity 0
[719b 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460af80 signed by 1 principal evaluation starts (used [true])
[719c 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460af80 skipping identity 0 because it has already been used
[719d 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460af80 principal evaluation fails
[719e 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460af80 gate 1582330572940663100 evaluation succeeds
[719f 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [72c3750f-2ce8-4a3e-a298-bb829d63b6f7]
[71a0 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [72c3750f-2ce8-4a3e-a298-bb829d63b6f7]
[71a1 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [d5e18933-ed94-469b-96d0-715c5afef076]
[71a2 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d5e18933-ed94-469b-96d0-715c5afef076]
[71a3 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU block 6, namespace: exp02, tx 0 validation results is: <nil>
[71a4 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 30121b6bd70426a40d0421dab62025ef96c961a31afb9c49f9592a711b2cc3d4 appears to be valid
[71a5 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch completes env bytes 0xc00366d800
[71a6 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[71a7 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 22ms
[71a8 02-22 00:16:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[71a9 02-22 00:16:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 0 private write sets from cache. channel=businesschannel
[71aa 02-22 00:16:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from transient store channel=businesschannel
[71ab 02-22 00:16:12.95 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [6] channel=businesschannel
[71ac 02-22 00:16:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6]
[71ad 02-22 00:16:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[71ae 02-22 00:16:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[71af 02-22 00:16:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[71b0 02-22 00:16:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6]
[71b1 02-22 00:16:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[71b2 02-22 00:16:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION
[71b3 02-22 00:16:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[71b4 02-22 00:16:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}
[71b5 02-22 00:16:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[71b6 02-22 00:16:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [􏿿initialized]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)
[71b7 02-22 00:16:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [30121b6bd70426a40d0421dab62025ef96c961a31afb9c49f9592a711b2cc3d4] marked as valid by state validator. ContainsPostOrderWrites [false]
[71b8 02-22 00:16:12.95 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"\x00\U0010ffffinitialized"}:(*internal.keyOps)(0xc00329a600), internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00329a640), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00329a680)}
[71b9 02-22 00:16:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[71ba 02-22 00:16:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[71bb 02-22 00:16:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[71bc 02-22 00:16:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6]
[71bd 02-22 00:16:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage
[71be 02-22 00:16:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store
[71bf 02-22 00:16:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0033783c0 env 0xc004107950 txn 0
[71c0 02-22 00:16:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[71c1 02-22 00:16:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6]
[71c2 02-22 00:16:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[71c3 02-22 00:16:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[71c4 02-22 00:16:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[71c5 02-22 00:16:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4056 bytes, seq: 6}, Envelope: 4086 bytes, Signature: 0 bytes to 1 peers
[71c6 02-22 00:16:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[71c7 02-22 00:16:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[71c8 02-22 00:16:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6]
[71c9 02-22 00:16:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4056 bytes, seq: 6}, Envelope: 4086 bytes, Signature: 0 bytes
[71ca 02-22 00:16:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[71cb 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0x57, 0x3, 0xc0, 0x5a, 0x9b, 0xf6, 0x4, 0x80, 0x18, 0x4e, 0xa3, 0xd9, 0xb, 0x97, 0x44, 0xd0, 0x34, 0x16, 0x19, 0x9, 0x4, 0x92, 0xa6, 0x82, 0xee, 0x1d, 0x31, 0xf5, 0x8c, 0x79, 0xd0, 0x72} txOffsets=
txId=30121b6bd70426a40d0421dab62025ef96c961a31afb9c49f9592a711b2cc3d4 locPointer=offset=70, bytesLength=3046
]
[71cc 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93505, bytesLength=3046] for tx ID: [30121b6bd70426a40d0421dab62025ef96c961a31afb9c49f9592a711b2cc3d4] to txid-index
[71cd 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93505, bytesLength=3046] for tx number:[0] ID: [30121b6bd70426a40d0421dab62025ef96c961a31afb9c49f9592a711b2cc3d4] to blockNumTranNum index
[71ce 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97513], isChainEmpty=[false], lastBlockNumber=[6]
[71cf 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database
[71d0 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[71d1 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[71d2 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[71d3 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[71d4 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dexp02􏿿initialized] key(bytes)=[[]byte{0x64, 0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x0, 0xf4, 0x8f, 0xbf, 0xbf, 0x69, 0x6e, 0x69, 0x74, 0x69, 0x61, 0x6c, 0x69, 0x7a, 0x65, 0x64}]
[71d5 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dexp02a] key(bytes)=[[]byte{0x64, 0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]
[71d6 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dexp02b] key(bytes)=[[]byte{0x64, 0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]
[71d7 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[71d8 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7]
[71d9 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}]
[71da 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7]
[71db 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[71dc 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database
[71dd 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions
[71de 02-22 00:16:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6]
[71df 02-22 00:16:12.99 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 41ms (state_validation=16ms block_and_pvtdata_commit=15ms state_commit=4ms) commitHash=[04f5ed54189d585ce9c318109144fb64170b18d54662533b3a969b449ad40b97]
[71e0 02-22 00:16:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A7B121408ACB284A6AEA4E4FA15...0F0A0A5F6C6966656379636C65120131
[71e1 02-22 00:16:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 93D8D1F99028CAD49C3A7BACECBF3757C7E9418F19AC37E260B25FD48683D889
[71e2 02-22 00:16:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s)
[71e3 02-22 00:16:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:12476280991823413822 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[71e4 02-22 00:16:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:12476280991823413822 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[71e5 02-22 00:16:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[71e6 02-22 00:16:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[71e7 02-22 00:16:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[71e8 02-22 00:16:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[71e9 02-22 00:16:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[71ea 02-22 00:16:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[71eb 02-22 00:16:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[71ec 02-22 00:16:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[71ed 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[71ee 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[71ef 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[71f0 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[71f1 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 af 8c 58 e0 6a 98 1e fc b2 2e cf df 36 e1 44 |...X.j.......6.D|
00000010 5e 9f 69 14 34 ac 6d d6 c2 a1 af 4d ea 0d 8d 84 |^.i.4.m....M....|
[71f2 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 48 5f 8b b4 45 7a 68 5e 0c 6a |0E.!..H_..Ezh^.j|
00000010 f4 cb 61 b3 9d ef ea 20 fe 32 61 e2 1f 27 4c a1 |..a.... .2a..'L.|
00000020 61 84 ff d3 c5 02 20 77 1e cb 74 a3 13 fa 72 38 |a..... w..t...r8|
00000030 13 9b 55 b3 af 68 0e d9 b5 97 bf 75 76 92 8e e5 |..U..h.....uv...|
00000040 dc d5 10 61 30 8e fe |...a0..|
[71f4 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[71f5 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 fd 09 16 b3 30 36 97 4f 86 b8 |0E.!......06.O..|
00000010 90 cb 75 b5 7b ea 80 33 07 20 9d 48 ca 36 91 96 |..u.{..3. .H.6..|
00000020 7f f8 40 f8 b4 02 20 46 5a e7 a7 8e 9b 6c d7 ad |..@... FZ....l..|
00000030 8c 4b 8e de 3b d1 8a 08 36 7b 27 cd 7e 72 61 5c |.K..;...6{'.~ra\|
00000040 52 9a a9 e7 53 7b 30 |R...S{0|
[71f3 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[71f6 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[71f7 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[71f8 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[71f9 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:85
[71fa 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:85
[71fb 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[71fc 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[71fd 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[71fe 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[71ff 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7200 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7201 02-22 00:16:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7202 02-22 00:16:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7203 02-22 00:16:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7204 02-22 00:16:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7205 02-22 00:16:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[7206 02-22 00:16:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7207 02-22 00:16:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[7208 02-22 00:16:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7209 02-22 00:16:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[720a 02-22 00:16:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[720b 02-22 00:16:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[720c 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[720d 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[720e 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[720f 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7210 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[7211 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7212 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7213 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7214 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7215 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7216 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7217 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7218 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 a2 28 6e 50 73 85 0b 23 79 31 7b 5e 2b 1c 56 |I.(nPs..#y1{^+.V|
00000010 4d f9 52 95 de 97 b8 13 a8 a1 44 aa 98 8b 0d 25 |M.R.......D....%|
[7219 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 1f de f1 29 8c 87 ca 26 24 04 51 |0D. *...)...&$.Q|
00000010 26 d8 80 f6 68 29 72 d1 07 6d 07 3b ea 36 51 ce |&...h)r..m.;.6Q.|
00000020 91 20 ce c5 02 20 17 8b ed 0c d0 68 56 d3 1b 4f |. ... .....hV..O|
00000030 a5 03 83 68 7c c4 1f a4 73 92 22 3b 84 54 de 3d |...h|...s.";.T.=|
00000040 ed a0 96 be f2 e6 |......|
[721a 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[721b 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004693a80 gate 1582330574267547600 evaluation starts
[721c 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004693a80 signed by 0 principal evaluation starts (used [false])
[721d 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004693a80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[721e 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004693a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[721f 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004693a80 principal evaluation fails
[7220 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004693a80 gate 1582330574267547600 evaluation fails
[7221 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7222 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7223 02-22 00:16:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7224 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 a2 28 6e 50 73 85 0b 23 79 31 7b 5e 2b 1c 56 |I.(nPs..#y1{^+.V|
00000010 4d f9 52 95 de 97 b8 13 a8 a1 44 aa 98 8b 0d 25 |M.R.......D....%|
[7225 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 1f de f1 29 8c 87 ca 26 24 04 51 |0D. *...)...&$.Q|
00000010 26 d8 80 f6 68 29 72 d1 07 6d 07 3b ea 36 51 ce |&...h)r..m.;.6Q.|
00000020 91 20 ce c5 02 20 17 8b ed 0c d0 68 56 d3 1b 4f |. ... .....hV..O|
00000030 a5 03 83 68 7c c4 1f a4 73 92 22 3b 84 54 de 3d |...h|...s.";.T.=|
00000040 ed a0 96 be f2 e6 |......|
[7226 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7227 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046aa380 gate 1582330574272071300 evaluation starts
[7228 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046aa380 signed by 0 principal evaluation starts (used [false])
[7229 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046aa380 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[722a 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046aa380 principal evaluation succeeds for identity 0
[722b 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046aa380 gate 1582330574272071300 evaluation succeeds
[722c 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[722d 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[722e 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[722f 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7230 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7231 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes]}
[7232 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:84
[7233 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:84
[7234 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[7235 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7236 02-22 00:16:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7237 02-22 00:16:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7238 02-22 00:16:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7239 02-22 00:16:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[723a 02-22 00:16:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[723b 02-22 00:16:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[723c 02-22 00:16:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[723d 02-22 00:16:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[723e 02-22 00:16:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[723f 02-22 00:16:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7240 02-22 00:16:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7241 02-22 00:16:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7242 02-22 00:16:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7243 02-22 00:16:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7244 02-22 00:16:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7245 02-22 00:16:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7246 02-22 00:16:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7247 02-22 00:16:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7248 02-22 00:16:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7249 02-22 00:16:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[724a 02-22 00:16:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[724b 02-22 00:16:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[724c 02-22 00:16:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA15101F1801
[724d 02-22 00:16:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 77EA7530AFC370A7F355205B715C7F5371A1AFB375C702EA847ED26BF89A5DEB
[724e 02-22 00:16:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[724f 02-22 00:16:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7250 02-22 00:16:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7251 02-22 00:16:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7252 02-22 00:16:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7253 02-22 00:16:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:31 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[7254 02-22 00:16:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7255 02-22 00:16:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7256 02-22 00:16:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:31 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[7257 02-22 00:16:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7258 02-22 00:16:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[7259 02-22 00:16:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[725a 02-22 00:16:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[725b 02-22 00:16:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[725c 02-22 00:16:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 11 bb 17 38 2c 96 dd ef 78 4c ee 80 d6 8b cf |{...8,...xL.....|
00000010 ad c1 f9 3e e6 bd 11 0c e0 a1 01 01 08 01 f9 54 |...>...........T|
[725d 02-22 00:16:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 7d c4 b5 ad 7c 51 92 98 2a aa |0E.!..}...|Q..*.|
00000010 b5 14 eb e5 a0 57 fa 80 cb fe b5 21 c6 11 49 87 |.....W.....!..I.|
00000020 3c 13 c9 d9 87 02 20 45 ef f0 10 77 33 29 6a f9 |<..... E...w3)j.|
00000030 0a f7 af 29 e2 03 30 87 d3 f9 88 5d 12 96 54 9a |...)..0....]..T.|
00000040 be 09 4d 5d 75 b7 ea |..M]u..|
[725e 02-22 00:16:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[725f 02-22 00:16:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 63 79 2e 64 56 97 86 36 c3 56 52 |0D. .cy.dV..6.VR|
00000010 6e 18 ef e1 51 af cc d5 7c 8e 74 ed a9 1c 9d ab |n...Q...|.t.....|
00000020 46 8b a2 a3 02 20 71 85 f6 ce 48 56 74 cc f1 6f |F.... q...HVt..o|
00000030 68 d5 7c 7a d8 dc 8d e2 f0 e0 5d 96 08 8b 88 c7 |h.|z......].....|
00000040 99 d5 27 cc b3 b6 |..'...|
[7260 02-22 00:16:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[7261 02-22 00:16:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[7262 02-22 00:16:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:86
[7263 02-22 00:16:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:86
[7264 02-22 00:16:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[7265 02-22 00:16:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7266 02-22 00:16:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7267 02-22 00:16:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7268 02-22 00:16:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[7269 02-22 00:16:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[726a 02-22 00:16:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[726b 02-22 00:16:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[726c 02-22 00:16:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[726d 02-22 00:16:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[726e 02-22 00:16:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[726f 02-22 00:16:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7270 02-22 00:16:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7271 02-22 00:16:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7272 02-22 00:16:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7273 02-22 00:16:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:743065536210373745 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7274 02-22 00:16:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:743065536210373745 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7275 02-22 00:16:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[7276 02-22 00:16:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7277 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:3818998553944744908 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7278 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:3818998553944744908 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7279 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:3818998553944744908 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[727a 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[727b 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[727c 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[727d 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[727e 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[727f 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7280 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[7281 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7282 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7284 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7285 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7286 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7283 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[7287 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:9552106782999066205 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[7288 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[7289 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2720918508802778819 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[728a 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[728b 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:8128727525323417327 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[728c 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:8128727525323417327 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[728d 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[728e 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:9552106782999066205 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[728f 02-22 00:16:14.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7290 02-22 00:16:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2720918508802778819 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7291 02-22 00:16:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7292 02-22 00:16:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8128727525323417327 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[7293 02-22 00:16:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8128727525323417327 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[7294 02-22 00:16:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8128727525323417327 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[7295 02-22 00:16:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7296 02-22 00:16:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9552106782999066205 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[7297 02-22 00:16:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9552106782999066205 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[7298 02-22 00:16:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7299 02-22 00:16:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2720918508802778819 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[729a 02-22 00:16:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2720918508802778819 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[729b 02-22 00:16:14.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[729c 02-22 00:16:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:85 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[729d 02-22 00:16:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:85 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[729e 02-22 00:16:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[729f 02-22 00:16:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:85 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[72a0 02-22 00:16:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[72a1 02-22 00:16:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[72a2 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[72a3 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[72a4 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[72a5 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[72a6 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[72a7 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[72a8 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 9b 5b ef d0 f8 1e af 9c 44 81 1c 78 e9 cc 3e |}.[......D..x..>|
00000010 b8 23 6f 0e 4a 6d 55 6a 70 6d 60 de 6a 15 c7 05 |.#o.JmUjpm`.j...|
[72a9 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0c 32 1b 17 31 e0 17 ff 42 3b 71 c1 |0D. .2..1...B;q.|
00000010 44 80 eb 9c 62 0f f5 ac 8e 4e 4f ac c3 28 c1 e7 |D...b....NO..(..|
00000020 5f 2d a2 02 02 20 4d 41 f2 aa bf 28 c6 77 17 ed |_-... MA...(.w..|
00000030 3a a2 a4 6c 7d 40 6a a4 e9 09 eb 38 67 f2 72 e8 |:..l}@j....8g.r.|
00000040 8a a1 13 05 1c fa |......|
[72aa 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[72ab 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472e7a0 gate 1582330574462765800 evaluation starts
[72ac 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472e7a0 signed by 0 principal evaluation starts (used [false])
[72ad 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472e7a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[72ae 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472e7a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[72af 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472e7a0 principal evaluation fails
[72b0 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472e7a0 gate 1582330574462765800 evaluation fails
[72b1 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[72b2 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[72b3 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[72b4 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 9b 5b ef d0 f8 1e af 9c 44 81 1c 78 e9 cc 3e |}.[......D..x..>|
00000010 b8 23 6f 0e 4a 6d 55 6a 70 6d 60 de 6a 15 c7 05 |.#o.JmUjpm`.j...|
[72b5 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0c 32 1b 17 31 e0 17 ff 42 3b 71 c1 |0D. .2..1...B;q.|
00000010 44 80 eb 9c 62 0f f5 ac 8e 4e 4f ac c3 28 c1 e7 |D...b....NO..(..|
00000020 5f 2d a2 02 02 20 4d 41 f2 aa bf 28 c6 77 17 ed |_-... MA...(.w..|
00000030 3a a2 a4 6c 7d 40 6a a4 e9 09 eb 38 67 f2 72 e8 |:..l}@j....8g.r.|
00000040 8a a1 13 05 1c fa |......|
[72b6 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[72b7 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472f0a0 gate 1582330574465764700 evaluation starts
[72b8 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472f0a0 signed by 0 principal evaluation starts (used [false])
[72b9 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472f0a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[72ba 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472f0a0 principal evaluation succeeds for identity 0
[72bb 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472f0a0 gate 1582330574465764700 evaluation succeeds
[72bc 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[72bd 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[72be 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[72bf 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[72c0 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:85 , Envelope: 83 bytes, Signature: 70 bytes
[72c1 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:85 , Envelope: 83 bytes, Signature: 70 bytes]}
[72c2 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:85
[72c3 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:85
[72c4 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[72c5 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[72c6 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[72c7 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[72c8 02-22 00:16:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[72c9 02-22 00:16:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[72ca 02-22 00:16:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[72cb 02-22 00:16:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[72cc 02-22 00:16:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[72cd 02-22 00:16:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[72ce 02-22 00:16:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[72cf 02-22 00:16:14.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[72d0 02-22 00:16:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151051
[72d1 02-22 00:16:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C8FED8982FBE461F20DD5617E381DC20951A7753FDF15380F76630B66CB15D0D
[72d2 02-22 00:16:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[72d3 02-22 00:16:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[72d4 02-22 00:16:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[72d5 02-22 00:16:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[72d6 02-22 00:16:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[72d7 02-22 00:16:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[72d8 02-22 00:16:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[72d9 02-22 00:16:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[72dc 02-22 00:16:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[72da 02-22 00:16:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[72dd 02-22 00:16:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[72db 02-22 00:16:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[72de 02-22 00:16:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[72df 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[72e0 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[72e1 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[72e2 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[72e3 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[72e4 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[72e5 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[72e6 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[72e7 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[72e8 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[72e9 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[72ea 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[72eb 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 8d 09 ea 22 73 e3 cc 31 ea c3 6a 16 1d e1 e2 |G..."s..1..j....|
00000010 53 df 68 0e 29 4c a8 5f c5 ae 04 f5 18 33 d3 81 |S.h.)L._.....3..|
[72ec 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 8c 5e f7 47 21 84 3f f1 ef c7 38 |0D. ..^.G!.?...8|
00000010 9f eb 79 70 50 9e 0b de 01 46 6e 30 b0 4b be f5 |..ypP....Fn0.K..|
00000020 1c e3 04 b8 02 20 7c 3a bc 53 ec ac 43 5b 81 b2 |..... |:.S..C[..|
00000030 21 7e 56 bc 2a d5 ef 23 a0 34 f1 6f b1 73 84 6e |!~V.*..#.4.o.s.n|
00000040 78 71 d9 4a 81 77 |xq.J.w|
[72ed 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[72ee 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004768240 gate 1582330574572832700 evaluation starts
[72ef 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004768240 signed by 0 principal evaluation starts (used [false])
[72f0 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004768240 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[72f1 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004768240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[72f2 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004768240 principal evaluation fails
[72f3 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004768240 gate 1582330574572832700 evaluation fails
[72f4 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[72f5 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[72f6 02-22 00:16:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[72f7 02-22 00:16:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 8d 09 ea 22 73 e3 cc 31 ea c3 6a 16 1d e1 e2 |G..."s..1..j....|
00000010 53 df 68 0e 29 4c a8 5f c5 ae 04 f5 18 33 d3 81 |S.h.)L._.....3..|
[72f8 02-22 00:16:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 8c 5e f7 47 21 84 3f f1 ef c7 38 |0D. ..^.G!.?...8|
00000010 9f eb 79 70 50 9e 0b de 01 46 6e 30 b0 4b be f5 |..ypP....Fn0.K..|
00000020 1c e3 04 b8 02 20 7c 3a bc 53 ec ac 43 5b 81 b2 |..... |:.S..C[..|
00000030 21 7e 56 bc 2a d5 ef 23 a0 34 f1 6f b1 73 84 6e |!~V.*..#.4.o.s.n|
00000040 78 71 d9 4a 81 77 |xq.J.w|
[72f9 02-22 00:16:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[72fa 02-22 00:16:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[72fb 02-22 00:16:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004748ec0 gate 1582330574584229500 evaluation starts
[72fc 02-22 00:16:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004748ec0 signed by 0 principal evaluation starts (used [false])
[72fd 02-22 00:16:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004748ec0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[72fe 02-22 00:16:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004748ec0 principal evaluation succeeds for identity 0
[72ff 02-22 00:16:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004748ec0 gate 1582330574584229500 evaluation succeeds
[7300 02-22 00:16:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7301 02-22 00:16:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7302 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7303 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7304 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes
[7305 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7306 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[7307 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 fe d8 98 2f be 46 1f 20 dd 56 17 e3 81 dc 20 |..../.F. .V.... |
00000010 95 1a 77 53 fd f1 53 80 f7 66 30 b6 6c b1 5d 0d |..wS..S..f0.l.].|
[7308 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 51 01 99 7e c2 a8 f8 be 4d ab 78 |0D. ?Q..~....M.x|
00000010 ff db 87 2e 44 a3 f9 95 b7 94 c2 94 d9 52 de 7e |....D........R.~|
00000020 c0 80 d7 cb 02 20 44 14 12 84 08 98 4f c1 1b 1e |..... D.....O...|
00000030 d3 5a 03 80 c1 eb fd 7b 29 75 32 e6 65 5a 4b 42 |.Z.....{)u2.eZKB|
00000040 c2 81 01 b5 8f d4 |......|
[7309 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes
[730a 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes
[730b 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[730c 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[730d 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 11 bb 17 38 2c 96 dd ef 78 4c ee 80 d6 8b cf |{...8,...xL.....|
00000010 ad c1 f9 3e e6 bd 11 0c e0 a1 01 01 08 01 f9 54 |...>...........T|
[730e 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 7d c4 b5 ad 7c 51 92 98 2a aa |0E.!..}...|Q..*.|
00000010 b5 14 eb e5 a0 57 fa 80 cb fe b5 21 c6 11 49 87 |.....W.....!..I.|
00000020 3c 13 c9 d9 87 02 20 45 ef f0 10 77 33 29 6a f9 |<..... E...w3)j.|
00000030 0a f7 af 29 e2 03 30 87 d3 f9 88 5d 12 96 54 9a |...)..0....]..T.|
00000040 be 09 4d 5d 75 b7 ea |..M]u..|
[730f 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes
[7310 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7311 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7313 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7314 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[7312 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[7315 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[7316 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 fe d8 98 2f be 46 1f 20 dd 56 17 e3 81 dc 20 |..../.F. .V.... |
00000010 95 1a 77 53 fd f1 53 80 f7 66 30 b6 6c b1 5d 0d |..wS..S..f0.l.].|
[7317 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 51 01 99 7e c2 a8 f8 be 4d ab 78 |0D. ?Q..~....M.x|
00000010 ff db 87 2e 44 a3 f9 95 b7 94 c2 94 d9 52 de 7e |....D........R.~|
00000020 c0 80 d7 cb 02 20 44 14 12 84 08 98 4f c1 1b 1e |..... D.....O...|
00000030 d3 5a 03 80 c1 eb fd 7b 29 75 32 e6 65 5a 4b 42 |.Z.....{)u2.eZKB|
00000040 c2 81 01 b5 8f d4 |......|
[7318 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[7319 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b a7 ab 31 bb 28 16 6f 8a 8f d1 99 |0D. ;..1.(.o....|
00000010 06 84 39 3b ad 78 f8 73 63 e0 4e 2e 63 c4 c8 43 |..9;.x.sc.N.c..C|
00000020 cb e8 5e 18 02 20 71 d6 33 66 47 52 eb b9 0d 8b |..^.. q.3fGR....|
00000030 62 eb e8 f0 52 51 ee 80 31 e5 f8 67 44 a1 34 7f |b...RQ..1..gD.4.|
00000040 57 cd 6b 49 29 32 |W.kI)2|
[731a 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[731b 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[731c 02-22 00:16:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[731d 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[731e 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[731f 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[7320 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[7321 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 fe d8 98 2f be 46 1f 20 dd 56 17 e3 81 dc 20 |..../.F. .V.... |
00000010 95 1a 77 53 fd f1 53 80 f7 66 30 b6 6c b1 5d 0d |..wS..S..f0.l.].|
[7322 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 51 01 99 7e c2 a8 f8 be 4d ab 78 |0D. ?Q..~....M.x|
00000010 ff db 87 2e 44 a3 f9 95 b7 94 c2 94 d9 52 de 7e |....D........R.~|
00000020 c0 80 d7 cb 02 20 44 14 12 84 08 98 4f c1 1b 1e |..... D.....O...|
00000030 d3 5a 03 80 c1 eb fd 7b 29 75 32 e6 65 5a 4b 42 |.Z.....{)u2.eZKB|
00000040 c2 81 01 b5 8f d4 |......|
[7323 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes
[7324 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes
[7325 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7326 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[7327 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 11 bb 17 38 2c 96 dd ef 78 4c ee 80 d6 8b cf |{...8,...xL.....|
00000010 ad c1 f9 3e e6 bd 11 0c e0 a1 01 01 08 01 f9 54 |...>...........T|
[7328 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 7d c4 b5 ad 7c 51 92 98 2a aa |0E.!..}...|Q..*.|
00000010 b5 14 eb e5 a0 57 fa 80 cb fe b5 21 c6 11 49 87 |.....W.....!..I.|
00000020 3c 13 c9 d9 87 02 20 45 ef f0 10 77 33 29 6a f9 |<..... E...w3)j.|
00000030 0a f7 af 29 e2 03 30 87 d3 f9 88 5d 12 96 54 9a |...)..0....]..T.|
00000040 be 09 4d 5d 75 b7 ea |..M]u..|
[7329 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes
[732a 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[732b 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[732c 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[732d 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[732e 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[732f 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7330 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7331 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7332 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7333 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 9b 5b ef d0 f8 1e af 9c 44 81 1c 78 e9 cc 3e |}.[......D..x..>|
00000010 b8 23 6f 0e 4a 6d 55 6a 70 6d 60 de 6a 15 c7 05 |.#o.JmUjpm`.j...|
[7334 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0c 32 1b 17 31 e0 17 ff 42 3b 71 c1 |0D. .2..1...B;q.|
00000010 44 80 eb 9c 62 0f f5 ac 8e 4e 4f ac c3 28 c1 e7 |D...b....NO..(..|
00000020 5f 2d a2 02 02 20 4d 41 f2 aa bf 28 c6 77 17 ed |_-... MA...(.w..|
00000030 3a a2 a4 6c 7d 40 6a a4 e9 09 eb 38 67 f2 72 e8 |:..l}@j....8g.r.|
00000040 8a a1 13 05 1c fa |......|
[7335 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7336 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a88a0 gate 1582330574607665900 evaluation starts
[7337 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a88a0 signed by 0 principal evaluation starts (used [false])
[7338 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a88a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7339 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a88a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[733a 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a88a0 principal evaluation fails
[733b 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a88a0 gate 1582330574607665900 evaluation fails
[733c 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[733d 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[733e 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[733f 02-22 00:16:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 9b 5b ef d0 f8 1e af 9c 44 81 1c 78 e9 cc 3e |}.[......D..x..>|
00000010 b8 23 6f 0e 4a 6d 55 6a 70 6d 60 de 6a 15 c7 05 |.#o.JmUjpm`.j...|
[7340 02-22 00:16:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0c 32 1b 17 31 e0 17 ff 42 3b 71 c1 |0D. .2..1...B;q.|
00000010 44 80 eb 9c 62 0f f5 ac 8e 4e 4f ac c3 28 c1 e7 |D...b....NO..(..|
00000020 5f 2d a2 02 02 20 4d 41 f2 aa bf 28 c6 77 17 ed |_-... MA...(.w..|
00000030 3a a2 a4 6c 7d 40 6a a4 e9 09 eb 38 67 f2 72 e8 |:..l}@j....8g.r.|
00000040 8a a1 13 05 1c fa |......|
[7341 02-22 00:16:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7342 02-22 00:16:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a91a0 gate 1582330574610790500 evaluation starts
[7343 02-22 00:16:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a91a0 signed by 0 principal evaluation starts (used [false])
[7344 02-22 00:16:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a91a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7345 02-22 00:16:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a91a0 principal evaluation succeeds for identity 0
[7346 02-22 00:16:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a91a0 gate 1582330574610790500 evaluation succeeds
[7347 02-22 00:16:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7348 02-22 00:16:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7349 02-22 00:16:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[734a 02-22 00:16:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[734b 02-22 00:16:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:85 , Envelope: 83 bytes, Signature: 70 bytes
[734c 02-22 00:16:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[734d 02-22 00:16:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[734e 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[734f 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7350 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7351 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[7352 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7353 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7354 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7355 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7356 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7357 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7358 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7359 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 59 9c f3 61 a6 7e f2 eb 12 f6 22 a3 4d ba 76 |VY..a.~....".M.v|
00000010 d4 07 85 ea 01 af 12 02 61 36 75 75 14 fb ab f5 |........a6uu....|
[735a 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f 6c ef 61 f9 3c 98 99 49 6b eb e8 |0D. .l.a.<..Ik..|
00000010 68 50 98 44 ef dd 3e ba 37 92 6d 6e 5e 39 9c 06 |hP.D..>.7.mn^9..|
00000020 6e 4e 5c 5f 02 20 2b d2 0c a2 8a f9 b6 f8 3c 01 |nN\_. +.......<.|
00000030 aa 69 a5 12 f0 43 dc 0a bc 06 9c 91 99 a1 65 d4 |.i...C........e.|
00000040 0a 57 e4 49 c3 2a |.W.I.*|
[735b 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[735c 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047c64f0 gate 1582330574654134800 evaluation starts
[735d 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047c64f0 signed by 0 principal evaluation starts (used [false])
[735e 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047c64f0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[735f 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047c64f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7360 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047c64f0 principal evaluation fails
[7361 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047c64f0 gate 1582330574654134800 evaluation fails
[7362 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7363 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7364 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7365 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 59 9c f3 61 a6 7e f2 eb 12 f6 22 a3 4d ba 76 |VY..a.~....".M.v|
00000010 d4 07 85 ea 01 af 12 02 61 36 75 75 14 fb ab f5 |........a6uu....|
[7366 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f 6c ef 61 f9 3c 98 99 49 6b eb e8 |0D. .l.a.<..Ik..|
00000010 68 50 98 44 ef dd 3e ba 37 92 6d 6e 5e 39 9c 06 |hP.D..>.7.mn^9..|
00000020 6e 4e 5c 5f 02 20 2b d2 0c a2 8a f9 b6 f8 3c 01 |nN\_. +.......<.|
00000030 aa 69 a5 12 f0 43 dc 0a bc 06 9c 91 99 a1 65 d4 |.i...C........e.|
00000040 0a 57 e4 49 c3 2a |.W.I.*|
[7367 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7368 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047c6df0 gate 1582330574658260400 evaluation starts
[7369 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047c6df0 signed by 0 principal evaluation starts (used [false])
[736a 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047c6df0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[736b 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047c6df0 principal evaluation succeeds for identity 0
[736c 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047c6df0 gate 1582330574658260400 evaluation succeeds
[736d 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[736e 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[736f 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7370 02-22 00:16:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7371 02-22 00:16:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[7372 02-22 00:16:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes]}
[7373 02-22 00:16:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:82
[7374 02-22 00:16:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:82
[7375 02-22 00:16:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:81 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[7376 02-22 00:16:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7377 02-22 00:16:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7378 02-22 00:16:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7379 02-22 00:16:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[737a 02-22 00:16:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[737b 02-22 00:16:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[737c 02-22 00:16:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[737d 02-22 00:16:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[737e 02-22 00:16:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[737f 02-22 00:16:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7380 02-22 00:16:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[7381 02-22 00:16:14.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151052
[7382 02-22 00:16:14.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3C2E3C6440B0D05A1D57E988834CD81166BB0F33F57758BE98C20F1543EFD9B7
[7383 02-22 00:16:14.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[7384 02-22 00:16:14.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[7385 02-22 00:16:14.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[7386 02-22 00:16:14.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7387 02-22 00:16:14.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7388 02-22 00:16:14.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7389 02-22 00:16:14.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[738a 02-22 00:16:14.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[738b 02-22 00:16:14.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[738c 02-22 00:16:14.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[738d 02-22 00:16:14.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[738f 02-22 00:16:14.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[738e 02-22 00:16:14.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[7390 02-22 00:16:14.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7391 02-22 00:16:14.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes
[7392 02-22 00:16:14.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7393 02-22 00:16:14.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7394 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7395 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[7396 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[7397 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7398 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[7399 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[739a 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[739b 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[739c 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[739d 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[739e 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[739f 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[73a0 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330572994701600 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes to 3 peers
[73a1 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[73a2 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[73a3 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[73a4 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 3f 4f 23 ac c5 c6 95 9b 67 44 a4 ae b9 25 c1 |g?O#.....gD...%.|
00000010 b4 e9 4a e9 a8 7e 10 ef 0f 57 36 b7 ac c6 c4 82 |..J..~...W6.....|
[73a5 02-22 00:16:14.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 7a 95 de b6 93 f3 8a 1c 08 28 |0E.!..z........(|
00000010 d1 21 43 f9 71 42 de 45 12 f0 2d ad 8e d8 9e 3d |.!C.qB.E..-....=|
00000020 5a 4f f7 06 1c 02 20 13 1a b7 21 64 56 49 3f 3d |ZO.... ...!dVI?=|
00000030 eb 0b 2f 2a c9 62 dc 65 39 23 2a 79 e4 b9 d6 cb |../*.b.e9#*y....|
00000040 1b d6 12 fd cf cf 6e |......n|
[73a6 02-22 00:16:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330572994701600 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[73a7 02-22 00:16:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[73a8 02-22 00:16:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 17 67 2f 02 a2 21 b9 54 5c e2 ea 24 f0 2c 37 |..g/..!.T\..$.,7|
00000010 99 4e fc 38 a7 4b bd 3b f6 c2 85 50 6d 2e 0c df |.N.8.K.;...Pm...|
[73a9 02-22 00:16:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2d fb 34 83 88 4b 44 e5 60 97 2e f3 |0D. -.4..KD.`...|
00000010 01 6a e1 05 cb 4a cc b6 74 f2 18 69 5b e4 64 1c |.j...J..t..i[.d.|
00000020 fd 5c 0a 4c 02 20 53 fa 77 59 19 f3 ec 93 94 5d |.\.L. S.wY.....]|
00000030 28 51 f2 8b 3d e0 90 f5 7b ec 5f 01 04 de b2 18 |(Q..=...{._.....|
00000040 81 63 fb 3c 3c b4 |.c.<<.|
[73aa 02-22 00:16:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330572994701600 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[73ab 02-22 00:16:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[73ac 02-22 00:16:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[73ad 02-22 00:16:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[73ae 02-22 00:16:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330572994701600 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[73af 02-22 00:16:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[73b0 02-22 00:16:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[73b1 02-22 00:16:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[73b2 02-22 00:16:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[73b3 02-22 00:16:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[73b4 02-22 00:16:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[73b5 02-22 00:16:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[73b6 02-22 00:16:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 1c c3 c4 11 84 d9 30 09 be d6 d4 aa 14 20 f4 |b......0...... .|
00000010 14 34 28 0e 94 b4 68 b7 f3 5d 26 ee 4d 10 98 9a |.4(...h..]&.M...|
[73b7 02-22 00:16:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 11 b4 0c e4 70 11 a3 ad db 87 |0E.!......p.....|
00000010 5f d1 ce b9 b4 50 d3 d4 06 40 8f c6 aa 6e 48 4c |_....P...@...nHL|
00000020 8d 5e 99 f6 03 02 20 53 0c f0 47 5d 4c d0 cd 43 |.^.... S..G]L..C|
00000030 9c 52 2d f0 02 46 81 79 8b 80 11 3c 48 1a ab bd |.R-..F.y...<H...|
00000040 25 df 22 88 3e 04 a1 |%.".>..|
[73b8 02-22 00:16:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[73b9 02-22 00:16:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1cc00 gate 1582330575004276200 evaluation starts
[73ba 02-22 00:16:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1cc00 signed by 0 principal evaluation starts (used [false])
[73bb 02-22 00:16:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1cc00 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[73bc 02-22 00:16:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1cc00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[73bd 02-22 00:16:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1cc00 principal evaluation fails
[73be 02-22 00:16:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1cc00 gate 1582330575004276200 evaluation fails
[73bf 02-22 00:16:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[73c0 02-22 00:16:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[73c1 02-22 00:16:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[73c2 02-22 00:16:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 1c c3 c4 11 84 d9 30 09 be d6 d4 aa 14 20 f4 |b......0...... .|
00000010 14 34 28 0e 94 b4 68 b7 f3 5d 26 ee 4d 10 98 9a |.4(...h..]&.M...|
[73c3 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 11 b4 0c e4 70 11 a3 ad db 87 |0E.!......p.....|
00000010 5f d1 ce b9 b4 50 d3 d4 06 40 8f c6 aa 6e 48 4c |_....P...@...nHL|
00000020 8d 5e 99 f6 03 02 20 53 0c f0 47 5d 4c d0 cd 43 |.^.... S..G]L..C|
00000030 9c 52 2d f0 02 46 81 79 8b 80 11 3c 48 1a ab bd |.R-..F.y...<H...|
00000040 25 df 22 88 3e 04 a1 |%.".>..|
[73c4 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[73c5 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1d500 gate 1582330575012130600 evaluation starts
[73c6 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1d500 signed by 0 principal evaluation starts (used [false])
[73c7 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1d500 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[73c8 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1d500 principal evaluation succeeds for identity 0
[73c9 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1d500 gate 1582330575012130600 evaluation succeeds
[73ca 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[73cb 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[73cc 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[73cd 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[73ce 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[73cf 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[73d0 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[73d1 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[73d2 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[73d3 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[73d4 02-22 00:16:15.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[73d5 02-22 00:16:15.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[73d6 02-22 00:16:15.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 cb 4e cb 14 ba cc 0a 90 99 58 b6 38 bc b5 a7 |..N.......X.8...|
00000010 9c ad a6 fe a4 01 43 6b b1 c3 64 ab 8f ea dd cf |......Ck..d.....|
[73d7 02-22 00:16:15.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 68 45 fd a3 a5 01 25 32 b7 e5 |0E.!..hE....%2..|
00000010 e1 5f d9 d4 18 4e a4 0f a2 9c a7 4b ef 4e 53 20 |._...N.....K.NS |
00000020 48 82 2e 72 44 02 20 13 0e af cd 37 ac 42 4f 88 |H..rD. ....7.BO.|
00000030 49 76 1c 4b e2 db a6 97 4d 57 ed 17 ac 56 4d b8 |Iv.K....MW...VM.|
00000040 1e 5d 66 93 2b 37 51 |.]f.+7Q|
[73d8 02-22 00:16:15.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[73d9 02-22 00:16:15.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a36f70 gate 1582330575029271700 evaluation starts
[73da 02-22 00:16:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a36f70 signed by 0 principal evaluation starts (used [false])
[73db 02-22 00:16:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a36f70 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[73dc 02-22 00:16:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a36f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[73dd 02-22 00:16:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a36f70 principal evaluation fails
[73de 02-22 00:16:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a36f70 gate 1582330575029271700 evaluation fails
[73df 02-22 00:16:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[73e0 02-22 00:16:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[73e1 02-22 00:16:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[73e2 02-22 00:16:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 cb 4e cb 14 ba cc 0a 90 99 58 b6 38 bc b5 a7 |..N.......X.8...|
00000010 9c ad a6 fe a4 01 43 6b b1 c3 64 ab 8f ea dd cf |......Ck..d.....|
[73e3 02-22 00:16:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 68 45 fd a3 a5 01 25 32 b7 e5 |0E.!..hE....%2..|
00000010 e1 5f d9 d4 18 4e a4 0f a2 9c a7 4b ef 4e 53 20 |._...N.....K.NS |
00000020 48 82 2e 72 44 02 20 13 0e af cd 37 ac 42 4f 88 |H..rD. ....7.BO.|
00000030 49 76 1c 4b e2 db a6 97 4d 57 ed 17 ac 56 4d b8 |Iv.K....MW...VM.|
00000040 1e 5d 66 93 2b 37 51 |.]f.+7Q|
[73e4 02-22 00:16:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[73e5 02-22 00:16:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a37870 gate 1582330575043806800 evaluation starts
[73e6 02-22 00:16:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a37870 signed by 0 principal evaluation starts (used [false])
[73e7 02-22 00:16:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a37870 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[73e8 02-22 00:16:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a37870 principal evaluation succeeds for identity 0
[73e9 02-22 00:16:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a37870 gate 1582330575043806800 evaluation succeeds
[73ea 02-22 00:16:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[73eb 02-22 00:16:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[73ec 02-22 00:16:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[73ed 02-22 00:16:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[73ee 02-22 00:16:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[73ef 02-22 00:16:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[73f0 02-22 00:16:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[73f1 02-22 00:16:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[73f2 02-22 00:16:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[73f3 02-22 00:16:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[73f4 02-22 00:16:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 cb 4e cb 14 ba cc 0a 90 99 58 b6 38 bc b5 a7 |..N.......X.8...|
00000010 9c ad a6 fe a4 01 43 6b b1 c3 64 ab 8f ea dd cf |......Ck..d.....|
[73f5 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 68 45 fd a3 a5 01 25 32 b7 e5 |0E.!..hE....%2..|
00000010 e1 5f d9 d4 18 4e a4 0f a2 9c a7 4b ef 4e 53 20 |._...N.....K.NS |
00000020 48 82 2e 72 44 02 20 13 0e af cd 37 ac 42 4f 88 |H..rD. ....7.BO.|
00000030 49 76 1c 4b e2 db a6 97 4d 57 ed 17 ac 56 4d b8 |Iv.K....MW...VM.|
00000040 1e 5d 66 93 2b 37 51 |.]f.+7Q|
[73f6 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[73f7 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4a600 gate 1582330575052683800 evaluation starts
[73f8 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4a600 signed by 0 principal evaluation starts (used [false])
[73f9 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4a600 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[73fa 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4a600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[73fb 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4a600 principal evaluation fails
[73fc 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4a600 gate 1582330575052683800 evaluation fails
[73fd 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[73fe 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[73ff 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7400 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 cb 4e cb 14 ba cc 0a 90 99 58 b6 38 bc b5 a7 |..N.......X.8...|
00000010 9c ad a6 fe a4 01 43 6b b1 c3 64 ab 8f ea dd cf |......Ck..d.....|
[7401 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 68 45 fd a3 a5 01 25 32 b7 e5 |0E.!..hE....%2..|
00000010 e1 5f d9 d4 18 4e a4 0f a2 9c a7 4b ef 4e 53 20 |._...N.....K.NS |
00000020 48 82 2e 72 44 02 20 13 0e af cd 37 ac 42 4f 88 |H..rD. ....7.BO.|
00000030 49 76 1c 4b e2 db a6 97 4d 57 ed 17 ac 56 4d b8 |Iv.K....MW...VM.|
00000040 1e 5d 66 93 2b 37 51 |.]f.+7Q|
[7402 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7403 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4af00 gate 1582330575057613800 evaluation starts
[7404 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4af00 signed by 0 principal evaluation starts (used [false])
[7405 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4af00 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7406 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4af00 principal evaluation succeeds for identity 0
[7407 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4af00 gate 1582330575057613800 evaluation succeeds
[7408 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7409 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[740a 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[740b 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[740c 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[740d 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 841 bytes, Signature: 0 bytes
[740e 02-22 00:16:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[740f 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 3f 4f 23 ac c5 c6 95 9b 67 44 a4 ae b9 25 c1 |g?O#.....gD...%.|
00000010 b4 e9 4a e9 a8 7e 10 ef 0f 57 36 b7 ac c6 c4 82 |..J..~...W6.....|
[7410 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 7a 95 de b6 93 f3 8a 1c 08 28 |0E.!..z........(|
00000010 d1 21 43 f9 71 42 de 45 12 f0 2d ad 8e d8 9e 3d |.!C.qB.E..-....=|
00000020 5a 4f f7 06 1c 02 20 13 1a b7 21 64 56 49 3f 3d |ZO.... ...!dVI?=|
00000030 eb 0b 2f 2a c9 62 dc 65 39 23 2a 79 e4 b9 d6 cb |../*.b.e9#*y....|
00000040 1b d6 12 fd cf cf 6e |......n|
[7411 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 17 67 2f 02 a2 21 b9 54 5c e2 ea 24 f0 2c 37 |..g/..!.T\..$.,7|
00000010 99 4e fc 38 a7 4b bd 3b f6 c2 85 50 6d 2e 0c df |.N.8.K.;...Pm...|
[7412 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2d fb 34 83 88 4b 44 e5 60 97 2e f3 |0D. -.4..KD.`...|
00000010 01 6a e1 05 cb 4a cc b6 74 f2 18 69 5b e4 64 1c |.j...J..t..i[.d.|
00000020 fd 5c 0a 4c 02 20 53 fa 77 59 19 f3 ec 93 94 5d |.\.L. S.wY.....]|
00000030 28 51 f2 8b 3d e0 90 f5 7b ec 5f 01 04 de b2 18 |(Q..=...{._.....|
00000040 81 63 fb 3c 3c b4 |.c.<<.|
[7413 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7414 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7415 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7416 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7417 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7418 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7419 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[741a 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[741b 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 7f 21 a2 1c 26 98 e9 ac 86 e9 46 ba 2e a0 6e |..!..&.....F...n|
00000010 e2 27 a0 6b ec 5d 7f 06 3d 12 07 bb bf 3e 34 e4 |.'.k.]..=....>4.|
[741c 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c ab 6d c6 12 35 b6 46 5c 4a 2a d7 |0D. |.m..5.F\J*.|
00000010 f1 36 27 1e 7f 20 5f 19 4b 53 d0 8c d2 23 72 cc |.6'.. _.KS...#r.|
00000020 6e 47 ad 16 02 20 0d 72 f6 b1 3b 26 60 ac b2 32 |nG... .r..;&`..2|
00000030 2f be 30 31 57 6d 64 96 09 92 98 e0 d5 2d bb 01 |/.01Wmd......-..|
00000040 ed c9 00 15 ab 5b |.....[|
[741d 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[741e 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5f9a0 gate 1582330575063848600 evaluation starts
[741f 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5f9a0 signed by 0 principal evaluation starts (used [false])
[7420 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5f9a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7421 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5f9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7422 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5f9a0 principal evaluation fails
[7423 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5f9a0 gate 1582330575063848600 evaluation fails
[7424 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7425 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7426 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7427 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 7f 21 a2 1c 26 98 e9 ac 86 e9 46 ba 2e a0 6e |..!..&.....F...n|
00000010 e2 27 a0 6b ec 5d 7f 06 3d 12 07 bb bf 3e 34 e4 |.'.k.]..=....>4.|
[7428 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c ab 6d c6 12 35 b6 46 5c 4a 2a d7 |0D. |.m..5.F\J*.|
00000010 f1 36 27 1e 7f 20 5f 19 4b 53 d0 8c d2 23 72 cc |.6'.. _.KS...#r.|
00000020 6e 47 ad 16 02 20 0d 72 f6 b1 3b 26 60 ac b2 32 |nG... .r..;&`..2|
00000030 2f be 30 31 57 6d 64 96 09 92 98 e0 d5 2d bb 01 |/.01Wmd......-..|
00000040 ed c9 00 15 ab 5b |.....[|
[7429 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[742a 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a762a0 gate 1582330575065825200 evaluation starts
[742b 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a762a0 signed by 0 principal evaluation starts (used [false])
[742c 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a762a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[742d 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a762a0 principal evaluation succeeds for identity 0
[742e 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a762a0 gate 1582330575065825200 evaluation succeeds
[742f 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7430 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7431 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7432 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7433 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7434 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7435 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7436 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7437 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7438 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7439 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[743a 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[743b 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 2b e3 a5 b1 b5 87 d5 e5 bf 9c 61 8e e8 e4 fb |.+.........a....|
00000010 e5 3a 31 da 5f 84 1d 5e 4a b2 a2 6b be 72 11 f0 |.:1._..^J..k.r..|
[743c 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 81 0e b6 de 1e 19 a5 65 8c 40 |0E.!.........e.@|
00000010 01 41 b4 1c ce a3 30 83 46 24 f0 2c 4b 7c d1 d5 |.A....0.F$.,K|..|
00000020 d8 49 a4 91 56 02 20 45 ca 0c 2b f5 2d 42 1f 5b |.I..V. E..+.-B.[|
00000030 67 01 75 70 a2 a1 05 f1 b9 c4 68 45 a0 83 03 20 |g.up......hE... |
00000040 10 51 a3 44 76 00 96 |.Q.Dv..|
[743d 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[743e 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a77d10 gate 1582330575069871100 evaluation starts
[743f 02-22 00:16:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a77d10 signed by 0 principal evaluation starts (used [false])
[7440 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a77d10 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7441 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a77d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7442 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a77d10 principal evaluation fails
[7443 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a77d10 gate 1582330575069871100 evaluation fails
[7444 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7445 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7446 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7447 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 2b e3 a5 b1 b5 87 d5 e5 bf 9c 61 8e e8 e4 fb |.+.........a....|
00000010 e5 3a 31 da 5f 84 1d 5e 4a b2 a2 6b be 72 11 f0 |.:1._..^J..k.r..|
[7448 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 81 0e b6 de 1e 19 a5 65 8c 40 |0E.!.........e.@|
00000010 01 41 b4 1c ce a3 30 83 46 24 f0 2c 4b 7c d1 d5 |.A....0.F$.,K|..|
00000020 d8 49 a4 91 56 02 20 45 ca 0c 2b f5 2d 42 1f 5b |.I..V. E..+.-B.[|
00000030 67 01 75 70 a2 a1 05 f1 b9 c4 68 45 a0 83 03 20 |g.up......hE... |
00000040 10 51 a3 44 76 00 96 |.Q.Dv..|
[7449 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[744a 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8e610 gate 1582330575070998100 evaluation starts
[744b 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8e610 signed by 0 principal evaluation starts (used [false])
[744c 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8e610 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[744d 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8e610 principal evaluation succeeds for identity 0
[744e 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8e610 gate 1582330575070998100 evaluation succeeds
[744f 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7450 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7451 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7452 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7453 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7454 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7455 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7456 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7457 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7458 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7459 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 2b e3 a5 b1 b5 87 d5 e5 bf 9c 61 8e e8 e4 fb |.+.........a....|
00000010 e5 3a 31 da 5f 84 1d 5e 4a b2 a2 6b be 72 11 f0 |.:1._..^J..k.r..|
[745a 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 81 0e b6 de 1e 19 a5 65 8c 40 |0E.!.........e.@|
00000010 01 41 b4 1c ce a3 30 83 46 24 f0 2c 4b 7c d1 d5 |.A....0.F$.,K|..|
00000020 d8 49 a4 91 56 02 20 45 ca 0c 2b f5 2d 42 1f 5b |.I..V. E..+.-B.[|
00000030 67 01 75 70 a2 a1 05 f1 b9 c4 68 45 a0 83 03 20 |g.up......hE... |
00000040 10 51 a3 44 76 00 96 |.Q.Dv..|
[745b 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[745c 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8f3a0 gate 1582330575073597500 evaluation starts
[745d 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8f3a0 signed by 0 principal evaluation starts (used [false])
[745e 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8f3a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[745f 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8f3a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7460 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8f3a0 principal evaluation fails
[7461 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8f3a0 gate 1582330575073597500 evaluation fails
[7462 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7463 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7464 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7465 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 2b e3 a5 b1 b5 87 d5 e5 bf 9c 61 8e e8 e4 fb |.+.........a....|
00000010 e5 3a 31 da 5f 84 1d 5e 4a b2 a2 6b be 72 11 f0 |.:1._..^J..k.r..|
[7466 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 81 0e b6 de 1e 19 a5 65 8c 40 |0E.!.........e.@|
00000010 01 41 b4 1c ce a3 30 83 46 24 f0 2c 4b 7c d1 d5 |.A....0.F$.,K|..|
00000020 d8 49 a4 91 56 02 20 45 ca 0c 2b f5 2d 42 1f 5b |.I..V. E..+.-B.[|
00000030 67 01 75 70 a2 a1 05 f1 b9 c4 68 45 a0 83 03 20 |g.up......hE... |
00000040 10 51 a3 44 76 00 96 |.Q.Dv..|
[7467 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7468 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8fca0 gate 1582330575075191300 evaluation starts
[7469 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8fca0 signed by 0 principal evaluation starts (used [false])
[746a 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8fca0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[746b 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8fca0 principal evaluation succeeds for identity 0
[746c 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a8fca0 gate 1582330575075191300 evaluation succeeds
[746d 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[746e 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[746f 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7470 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7471 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7472 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[7473 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 3f 4f 23 ac c5 c6 95 9b 67 44 a4 ae b9 25 c1 |g?O#.....gD...%.|
00000010 b4 e9 4a e9 a8 7e 10 ef 0f 57 36 b7 ac c6 c4 82 |..J..~...W6.....|
[7474 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 7a 95 de b6 93 f3 8a 1c 08 28 |0E.!..z........(|
00000010 d1 21 43 f9 71 42 de 45 12 f0 2d ad 8e d8 9e 3d |.!C.qB.E..-....=|
00000020 5a 4f f7 06 1c 02 20 13 1a b7 21 64 56 49 3f 3d |ZO.... ...!dVI?=|
00000030 eb 0b 2f 2a c9 62 dc 65 39 23 2a 79 e4 b9 d6 cb |../*.b.e9#*y....|
00000040 1b d6 12 fd cf cf 6e |......n|
[7475 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7476 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7477 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7478 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7479 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[747a 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[747b 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[747c 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[747d 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 1c c3 c4 11 84 d9 30 09 be d6 d4 aa 14 20 f4 |b......0...... .|
00000010 14 34 28 0e 94 b4 68 b7 f3 5d 26 ee 4d 10 98 9a |.4(...h..]&.M...|
[747e 02-22 00:16:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 11 b4 0c e4 70 11 a3 ad db 87 |0E.!......p.....|
00000010 5f d1 ce b9 b4 50 d3 d4 06 40 8f c6 aa 6e 48 4c |_....P...@...nHL|
00000020 8d 5e 99 f6 03 02 20 53 0c f0 47 5d 4c d0 cd 43 |.^.... S..G]L..C|
00000030 9c 52 2d f0 02 46 81 79 8b 80 11 3c 48 1a ab bd |.R-..F.y...<H...|
00000040 25 df 22 88 3e 04 a1 |%.".>..|
[747f 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7480 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa3fb0 gate 1582330575080762900 evaluation starts
[7481 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa3fb0 signed by 0 principal evaluation starts (used [false])
[7482 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa3fb0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7483 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa3fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7484 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa3fb0 principal evaluation fails
[7485 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa3fb0 gate 1582330575080762900 evaluation fails
[7486 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7487 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7488 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7489 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 1c c3 c4 11 84 d9 30 09 be d6 d4 aa 14 20 f4 |b......0...... .|
00000010 14 34 28 0e 94 b4 68 b7 f3 5d 26 ee 4d 10 98 9a |.4(...h..]&.M...|
[748a 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 11 b4 0c e4 70 11 a3 ad db 87 |0E.!......p.....|
00000010 5f d1 ce b9 b4 50 d3 d4 06 40 8f c6 aa 6e 48 4c |_....P...@...nHL|
00000020 8d 5e 99 f6 03 02 20 53 0c f0 47 5d 4c d0 cd 43 |.^.... S..G]L..C|
00000030 9c 52 2d f0 02 46 81 79 8b 80 11 3c 48 1a ab bd |.R-..F.y...<H...|
00000040 25 df 22 88 3e 04 a1 |%.".>..|
[748b 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[748c 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac08b0 gate 1582330575083167400 evaluation starts
[748d 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac08b0 signed by 0 principal evaluation starts (used [false])
[748e 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac08b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[748f 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac08b0 principal evaluation succeeds for identity 0
[7490 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac08b0 gate 1582330575083167400 evaluation succeeds
[7491 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7492 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7493 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7494 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7495 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7496 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7497 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7498 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7499 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[749a 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[749b 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[749c 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[749d 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 7f 21 a2 1c 26 98 e9 ac 86 e9 46 ba 2e a0 6e |..!..&.....F...n|
00000010 e2 27 a0 6b ec 5d 7f 06 3d 12 07 bb bf 3e 34 e4 |.'.k.]..=....>4.|
[749e 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c ab 6d c6 12 35 b6 46 5c 4a 2a d7 |0D. |.m..5.F\J*.|
00000010 f1 36 27 1e 7f 20 5f 19 4b 53 d0 8c d2 23 72 cc |.6'.. _.KS...#r.|
00000020 6e 47 ad 16 02 20 0d 72 f6 b1 3b 26 60 ac b2 32 |nG... .r..;&`..2|
00000030 2f be 30 31 57 6d 64 96 09 92 98 e0 d5 2d bb 01 |/.01Wmd......-..|
00000040 ed c9 00 15 ab 5b |.....[|
[749f 02-22 00:16:15.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[74a0 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc320 gate 1582330575090021600 evaluation starts
[74a1 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc320 signed by 0 principal evaluation starts (used [false])
[74a2 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc320 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[74a3 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[74a4 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc320 principal evaluation fails
[74a5 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc320 gate 1582330575090021600 evaluation fails
[74a6 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[74a7 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[74a8 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[74a9 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 7f 21 a2 1c 26 98 e9 ac 86 e9 46 ba 2e a0 6e |..!..&.....F...n|
00000010 e2 27 a0 6b ec 5d 7f 06 3d 12 07 bb bf 3e 34 e4 |.'.k.]..=....>4.|
[74aa 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c ab 6d c6 12 35 b6 46 5c 4a 2a d7 |0D. |.m..5.F\J*.|
00000010 f1 36 27 1e 7f 20 5f 19 4b 53 d0 8c d2 23 72 cc |.6'.. _.KS...#r.|
00000020 6e 47 ad 16 02 20 0d 72 f6 b1 3b 26 60 ac b2 32 |nG... .r..;&`..2|
00000030 2f be 30 31 57 6d 64 96 09 92 98 e0 d5 2d bb 01 |/.01Wmd......-..|
00000040 ed c9 00 15 ab 5b |.....[|
[74ab 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[74ac 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adcc20 gate 1582330575093770400 evaluation starts
[74ad 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adcc20 signed by 0 principal evaluation starts (used [false])
[74ae 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adcc20 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[74af 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adcc20 principal evaluation succeeds for identity 0
[74b0 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adcc20 gate 1582330575093770400 evaluation succeeds
[74b1 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[74b2 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[74b3 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[74b4 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[74b5 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a 02 38 4f a9 ff 0f e2 66 92 0b 49 99 9e 50 8f |J.8O....f..I..P.|
00000010 7b 70 ce 57 1e 9e ba cf 50 e6 e2 9f 94 82 be 39 |{p.W....P......9|
[74b6 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 8a 59 83 88 e7 d1 b5 af 57 d1 |0E.!...Y......W.|
00000010 40 ff fd 6f 6f 16 ab 3c 8d 31 c2 bc 51 72 4c 69 |@..oo..<.1..QrLi|
00000020 1f 05 05 3a 87 02 20 38 b3 21 f3 0c 5a ed 77 84 |...:.. 8.!..Z.w.|
00000030 d2 80 3b 82 eb 6d 33 9e 42 dc 6d 6d 42 ce a9 6d |..;..m3.B.mmB..m|
00000040 9f 8b 7e 59 b1 d9 a0 |..~Y...|
[74b7 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[74b8 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[74b9 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[74ba 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[74bb 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[74bc 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a 02 38 4f a9 ff 0f e2 66 92 0b 49 99 9e 50 8f |J.8O....f..I..P.|
00000010 7b 70 ce 57 1e 9e ba cf 50 e6 e2 9f 94 82 be 39 |{p.W....P......9|
[74bd 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 8a 59 83 88 e7 d1 b5 af 57 d1 |0E.!...Y......W.|
00000010 40 ff fd 6f 6f 16 ab 3c 8d 31 c2 bc 51 72 4c 69 |@..oo..<.1..QrLi|
00000020 1f 05 05 3a 87 02 20 38 b3 21 f3 0c 5a ed 77 84 |...:.. 8.!..Z.w.|
00000030 d2 80 3b 82 eb 6d 33 9e 42 dc 6d 6d 42 ce a9 6d |..;..m3.B.mmB..m|
00000040 9f 8b 7e 59 b1 d9 a0 |..~Y...|
[74be 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[74bf 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004addfa0 gate 1582330575099328800 evaluation starts
[74c0 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004addfa0 signed by 0 principal evaluation starts (used [false])
[74c1 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004addfa0 processing identity 0 - &{Org1MSP 8be655ba89451b517544b2a241617d188129889401e79f0659d7ccb414b44486}
[74c2 02-22 00:16:15.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004addfa0 principal evaluation succeeds for identity 0
[74c3 02-22 00:16:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004addfa0 gate 1582330575099328800 evaluation succeeds
[74c4 02-22 00:16:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[74c5 02-22 00:16:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[74c6 02-22 00:16:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[74c7 02-22 00:16:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[74c8 02-22 00:16:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74c9 02-22 00:16:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330572994701600 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[74ca 02-22 00:16:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 d8 d1 f9 90 28 ca d4 9c 3a 7b ac ec bf 37 57 |.....(...:{...7W|
00000010 c7 e9 41 8f 19 ac 37 e2 60 b2 5f d4 86 83 d8 89 |..A...7.`._.....|
[74cb 02-22 00:16:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 88 d4 6d 1b da 88 e7 7c 30 c4 |0E.!....m....|0.|
00000010 10 5f b5 d9 c3 a5 dd 8c b7 f4 87 e3 20 77 d0 a2 |._.......... w..|
00000020 fc fb 1a 7b 0b 02 20 42 a9 95 58 12 b6 66 86 4f |...{.. B..X..f.O|
00000030 86 af a6 5d de 4c f6 0f d2 aa 18 9c f5 8c b9 8f |...].L..........|
00000040 aa 02 9c 0a f0 6d 7f |.....m.|
[74cc 02-22 00:16:15.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74cd 02-22 00:16:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[74ce 02-22 00:16:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[74cf 02-22 00:16:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[74d0 02-22 00:16:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[74d1 02-22 00:16:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[74d2 02-22 00:16:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:656349338029186368 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[74d3 02-22 00:16:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:656349338029186368 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[74d4 02-22 00:16:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74d5 02-22 00:16:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[74d6 02-22 00:16:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74d7 02-22 00:16:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[74d8 02-22 00:16:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[74d9 02-22 00:16:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[74da 02-22 00:16:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[74db 02-22 00:16:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[74dc 02-22 00:16:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[74dd 02-22 00:16:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[74de 02-22 00:16:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[74df 02-22 00:16:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[74e0 02-22 00:16:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb e4 4b 7a 03 80 a9 50 2f 29 5a 51 f0 77 ef 2d |..Kz...P/)ZQ.w.-|
00000010 a6 ef 56 02 3a 84 75 66 a1 c5 1d ed 3b 78 c0 12 |..V.:.uf....;x..|
[74e1 02-22 00:16:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 44 94 dd 67 e7 6b 69 e9 60 1c 52 |0D. xD..g.ki.`.R|
00000010 8d 04 45 d6 13 66 38 2f 5b fe 8f 6a 6a 26 a4 83 |..E..f8/[..jj&..|
00000020 98 a1 40 16 02 20 53 6c 89 f9 8a 94 9a 0c 7a 54 |..@.. Sl......zT|
00000030 76 89 33 52 ce 71 28 0d 3f de 24 f7 ef de b1 bd |v.3R.q(.?.$.....|
00000040 fe 72 c7 25 bf 9c |.r.%..|
[74e2 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[74e3 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b0ee90 gate 1582330575160255600 evaluation starts
[74e4 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b0ee90 signed by 0 principal evaluation starts (used [false])
[74e5 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b0ee90 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[74e6 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b0ee90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[74e7 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 656349338029186368 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5 6], Envelope: 51 bytes, Signature: 0 bytes
[74e8 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b0ee90 principal evaluation fails
[74e9 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b0ee90 gate 1582330575160255600 evaluation fails
[74ea 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[74eb 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[74ec 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 656349338029186368 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5 6], Envelope: 51 bytes, Signature: 0 bytes
[74ed 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[74ee 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[74ef 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb e4 4b 7a 03 80 a9 50 2f 29 5a 51 f0 77 ef 2d |..Kz...P/)ZQ.w.-|
00000010 a6 ef 56 02 3a 84 75 66 a1 c5 1d ed 3b 78 c0 12 |..V.:.uf....;x..|
[74f0 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 44 94 dd 67 e7 6b 69 e9 60 1c 52 |0D. xD..g.ki.`.R|
00000010 8d 04 45 d6 13 66 38 2f 5b fe 8f 6a 6a 26 a4 83 |..E..f8/[..jj&..|
00000020 98 a1 40 16 02 20 53 6c 89 f9 8a 94 9a 0c 7a 54 |..@.. Sl......zT|
00000030 76 89 33 52 ce 71 28 0d 3f de 24 f7 ef de b1 bd |v.3R.q(.?.$.....|
00000040 fe 72 c7 25 bf 9c |.r.%..|
[74f1 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[74f2 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[74f3 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[74f4 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b0f790 gate 1582330575160766000 evaluation starts
[74f5 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b0f790 signed by 0 principal evaluation starts (used [false])
[74f6 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b0f790 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[74f7 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b0f790 principal evaluation succeeds for identity 0
[74f8 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b0f790 gate 1582330575160766000 evaluation succeeds
[74f9 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[74fa 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[74fb 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[74fc 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[74fd 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[74fe 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes]}
[74ff 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:83
[7500 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:83
[7501 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:82 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[7502 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7503 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7504 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7505 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[7506 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7507 02-22 00:16:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7508 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7509 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[750a 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[750b 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[750c 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[750d 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[750e 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[750f 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7510 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7511 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7512 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[7514 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7513 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[7515 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7516 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[7517 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7518 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes
[7519 02-22 00:16:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[751a 02-22 00:16:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[751b 02-22 00:16:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[751c 02-22 00:16:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[751d 02-22 00:16:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[751e 02-22 00:16:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330573011244900 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[751f 02-22 00:16:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a 02 38 4f a9 ff 0f e2 66 92 0b 49 99 9e 50 8f |J.8O....f..I..P.|
00000010 7b 70 ce 57 1e 9e ba cf 50 e6 e2 9f 94 82 be 39 |{p.W....P......9|
[7520 02-22 00:16:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 8a 59 83 88 e7 d1 b5 af 57 d1 |0E.!...Y......W.|
00000010 40 ff fd 6f 6f 16 ab 3c 8d 31 c2 bc 51 72 4c 69 |@..oo..<.1..QrLi|
00000020 1f 05 05 3a 87 02 20 38 b3 21 f3 0c 5a ed 77 84 |...:.. 8.!..Z.w.|
00000030 d2 80 3b 82 eb 6d 33 9e 42 dc 6d 6d 42 ce a9 6d |..;..m3.B.mmB..m|
00000040 9f 8b 7e 59 b1 d9 a0 |..~Y...|
[7521 02-22 00:16:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7522 02-22 00:16:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330573011244900 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7523 02-22 00:16:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a 02 38 4f a9 ff 0f e2 66 92 0b 49 99 9e 50 8f |J.8O....f..I..P.|
00000010 7b 70 ce 57 1e 9e ba cf 50 e6 e2 9f 94 82 be 39 |{p.W....P......9|
[7524 02-22 00:16:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 8a 59 83 88 e7 d1 b5 af 57 d1 |0E.!...Y......W.|
00000010 40 ff fd 6f 6f 16 ab 3c 8d 31 c2 bc 51 72 4c 69 |@..oo..<.1..QrLi|
00000020 1f 05 05 3a 87 02 20 38 b3 21 f3 0c 5a ed 77 84 |...:.. 8.!..Z.w.|
00000030 d2 80 3b 82 eb 6d 33 9e 42 dc 6d 6d 42 ce a9 6d |..;..m3.B.mmB..m|
00000040 9f 8b 7e 59 b1 d9 a0 |..~Y...|
[7525 02-22 00:16:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7526 02-22 00:16:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7527 02-22 00:16:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330573011244900 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7528 02-22 00:16:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330573011244900 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7529 02-22 00:16:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a 02 38 4f a9 ff 0f e2 66 92 0b 49 99 9e 50 8f |J.8O....f..I..P.|
00000010 7b 70 ce 57 1e 9e ba cf 50 e6 e2 9f 94 82 be 39 |{p.W....P......9|
[752a 02-22 00:16:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 8a 59 83 88 e7 d1 b5 af 57 d1 |0E.!...Y......W.|
00000010 40 ff fd 6f 6f 16 ab 3c 8d 31 c2 bc 51 72 4c 69 |@..oo..<.1..QrLi|
00000020 1f 05 05 3a 87 02 20 38 b3 21 f3 0c 5a ed 77 84 |...:.. 8.!..Z.w.|
00000030 d2 80 3b 82 eb 6d 33 9e 42 dc 6d 6d 42 ce a9 6d |..;..m3.B.mmB..m|
00000040 9f 8b 7e 59 b1 d9 a0 |..~Y...|
[752b 02-22 00:16:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[752c 02-22 00:16:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[752d 02-22 00:16:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11128945726143878935 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[752e 02-22 00:16:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:11128945726143878935 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[752f 02-22 00:16:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[7530 02-22 00:16:15.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7531 02-22 00:16:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[7532 02-22 00:16:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7533 02-22 00:16:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7534 02-22 00:16:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7535 02-22 00:16:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7536 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330573019078800 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7537 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7538 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7539 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[753a 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[753b 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[753c 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[753d 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[753e 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 2b e3 a5 b1 b5 87 d5 e5 bf 9c 61 8e e8 e4 fb |.+.........a....|
00000010 e5 3a 31 da 5f 84 1d 5e 4a b2 a2 6b be 72 11 f0 |.:1._..^J..k.r..|
[753f 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 81 0e b6 de 1e 19 a5 65 8c 40 |0E.!.........e.@|
00000010 01 41 b4 1c ce a3 30 83 46 24 f0 2c 4b 7c d1 d5 |.A....0.F$.,K|..|
00000020 d8 49 a4 91 56 02 20 45 ca 0c 2b f5 2d 42 1f 5b |.I..V. E..+.-B.[|
00000030 67 01 75 70 a2 a1 05 f1 b9 c4 68 45 a0 83 03 20 |g.up......hE... |
00000040 10 51 a3 44 76 00 96 |.Q.Dv..|
[7540 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7541 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b67840 gate 1582330575917076900 evaluation starts
[7542 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b67840 signed by 0 principal evaluation starts (used [false])
[7543 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b67840 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7544 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b67840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7545 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b67840 principal evaluation fails
[7546 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b67840 gate 1582330575917076900 evaluation fails
[7547 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7548 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7549 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[754a 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 2b e3 a5 b1 b5 87 d5 e5 bf 9c 61 8e e8 e4 fb |.+.........a....|
00000010 e5 3a 31 da 5f 84 1d 5e 4a b2 a2 6b be 72 11 f0 |.:1._..^J..k.r..|
[754b 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 81 0e b6 de 1e 19 a5 65 8c 40 |0E.!.........e.@|
00000010 01 41 b4 1c ce a3 30 83 46 24 f0 2c 4b 7c d1 d5 |.A....0.F$.,K|..|
00000020 d8 49 a4 91 56 02 20 45 ca 0c 2b f5 2d 42 1f 5b |.I..V. E..+.-B.[|
00000030 67 01 75 70 a2 a1 05 f1 b9 c4 68 45 a0 83 03 20 |g.up......hE... |
00000040 10 51 a3 44 76 00 96 |.Q.Dv..|
[754c 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[754d 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b8a140 gate 1582330575919120800 evaluation starts
[754e 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b8a140 signed by 0 principal evaluation starts (used [false])
[754f 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b8a140 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7550 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b8a140 principal evaluation succeeds for identity 0
[7551 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b8a140 gate 1582330575919120800 evaluation succeeds
[7552 02-22 00:16:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7553 02-22 00:16:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7554 02-22 00:16:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7555 02-22 00:16:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7556 02-22 00:16:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7557 02-22 00:16:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7558 02-22 00:16:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330573019078800 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7559 02-22 00:16:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330573019078800 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[755a 02-22 00:16:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[755b 02-22 00:16:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[755c 02-22 00:16:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[755d 02-22 00:16:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[755e 02-22 00:16:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[755f 02-22 00:16:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7560 02-22 00:16:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7561 02-22 00:16:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 2b e3 a5 b1 b5 87 d5 e5 bf 9c 61 8e e8 e4 fb |.+.........a....|
00000010 e5 3a 31 da 5f 84 1d 5e 4a b2 a2 6b be 72 11 f0 |.:1._..^J..k.r..|
[7562 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 81 0e b6 de 1e 19 a5 65 8c 40 |0E.!.........e.@|
00000010 01 41 b4 1c ce a3 30 83 46 24 f0 2c 4b 7c d1 d5 |.A....0.F$.,K|..|
00000020 d8 49 a4 91 56 02 20 45 ca 0c 2b f5 2d 42 1f 5b |.I..V. E..+.-B.[|
00000030 67 01 75 70 a2 a1 05 f1 b9 c4 68 45 a0 83 03 20 |g.up......hE... |
00000040 10 51 a3 44 76 00 96 |.Q.Dv..|
[7563 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7564 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b699e0 gate 1582330575941417600 evaluation starts
[7565 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b699e0 signed by 0 principal evaluation starts (used [false])
[7566 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b699e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7567 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b699e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7568 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b699e0 principal evaluation fails
[7569 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b699e0 gate 1582330575941417600 evaluation fails
[756a 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[756b 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[756c 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[756d 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 2b e3 a5 b1 b5 87 d5 e5 bf 9c 61 8e e8 e4 fb |.+.........a....|
00000010 e5 3a 31 da 5f 84 1d 5e 4a b2 a2 6b be 72 11 f0 |.:1._..^J..k.r..|
[756e 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 81 0e b6 de 1e 19 a5 65 8c 40 |0E.!.........e.@|
00000010 01 41 b4 1c ce a3 30 83 46 24 f0 2c 4b 7c d1 d5 |.A....0.F$.,K|..|
00000020 d8 49 a4 91 56 02 20 45 ca 0c 2b f5 2d 42 1f 5b |.I..V. E..+.-B.[|
00000030 67 01 75 70 a2 a1 05 f1 b9 c4 68 45 a0 83 03 20 |g.up......hE... |
00000040 10 51 a3 44 76 00 96 |.Q.Dv..|
[756f 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7570 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bae2e0 gate 1582330575949393200 evaluation starts
[7571 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bae2e0 signed by 0 principal evaluation starts (used [false])
[7572 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bae2e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7573 02-22 00:16:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bae2e0 principal evaluation succeeds for identity 0
[7574 02-22 00:16:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bae2e0 gate 1582330575949393200 evaluation succeeds
[7575 02-22 00:16:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7576 02-22 00:16:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7577 02-22 00:16:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7578 02-22 00:16:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7579 02-22 00:16:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[757a 02-22 00:16:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[757b 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:44976
[757c 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel=businesschannel txID=5212dd92 mspID=Org1MSP
[757d 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 96 3c 77 50 b0 06 5e 6e 44 7b 10 cb 8f e1 39 |V.<wP..^nD{....9|
00000010 8b 45 37 fc 6e dc f6 05 80 de 08 5b ce cb d7 a2 |.E7.n......[....|
[757e 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 5a de bb 56 91 e1 ac f7 f8 ee |0E.!..Z..V......|
00000010 6a 9a 8d 75 1a 4f 49 05 d7 a2 73 3e fb 9a 0d eb |j..u.OI...s>....|
00000020 a3 93 2b 60 a5 02 20 7e 5d df 7a 78 7d b1 79 b5 |..+`.. ~].zx}.y.|
00000030 63 98 dc 36 94 9a 8a eb 4b 0b 6d 05 f5 54 7e 73 |c..6....K.m..T~s|
00000040 0b 6f b4 74 c0 85 6e |.o.t..n|
[757f 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel=businesschannel txID=5212dd92 mspID=Org1MSP
[7580 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [5212dd9294c4363e8eb596dd192c524cd31a383f3425cb7a266539da15d44073]
[7581 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x35, 0x32, 0x31, 0x32, 0x64, 0x64, 0x39, 0x32, 0x39, 0x34, 0x63, 0x34, 0x33, 0x36, 0x33, 0x65, 0x38, 0x65, 0x62, 0x35, 0x39, 0x36, 0x64, 0x64, 0x31, 0x39, 0x32, 0x63, 0x35, 0x32, 0x34, 0x63, 0x64, 0x33, 0x31, 0x61, 0x33, 0x38, 0x33, 0x66, 0x33, 0x34, 0x32, 0x35, 0x63, 0x62, 0x37, 0x61, 0x32, 0x36, 0x36, 0x35, 0x33, 0x39, 0x64, 0x61, 0x31, 0x35, 0x64, 0x34, 0x34, 0x30, 0x37, 0x33}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x35, 0x32, 0x31, 0x32, 0x64, 0x64, 0x39, 0x32, 0x39, 0x34, 0x63, 0x34, 0x33, 0x36, 0x33, 0x65, 0x38, 0x65, 0x62, 0x35, 0x39, 0x36, 0x64, 0x64, 0x31, 0x39, 0x32, 0x63, 0x35, 0x32, 0x34, 0x63, 0x64, 0x33, 0x31, 0x61, 0x33, 0x38, 0x33, 0x66, 0x33, 0x34, 0x32, 0x35, 0x63, 0x62, 0x37, 0x61, 0x32, 0x36, 0x36, 0x35, 0x33, 0x39, 0x64, 0x61, 0x31, 0x35, 0x64, 0x34, 0x34, 0x30, 0x37, 0x33, 0xff}]
[7582 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose
[7583 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[7584 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[7585 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7586 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[7587 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 96 3c 77 50 b0 06 5e 6e 44 7b 10 cb 8f e1 39 |V.<wP..^nD{....9|
00000010 8b 45 37 fc 6e dc f6 05 80 de 08 5b ce cb d7 a2 |.E7.n......[....|
[7588 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 5a de bb 56 91 e1 ac f7 f8 ee |0E.!..Z..V......|
00000010 6a 9a 8d 75 1a 4f 49 05 d7 a2 73 3e fb 9a 0d eb |j..u.OI...s>....|
00000020 a3 93 2b 60 a5 02 20 7e 5d df 7a 78 7d b1 79 b5 |..+`.. ~].zx}.y.|
00000030 63 98 dc 36 94 9a 8a eb 4b 0b 6d 05 f5 54 7e 73 |c..6....K.m..T~s|
00000040 0b 6f b4 74 c0 85 6e |.o.t..n|
[7589 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[758a 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bafcf0 gate 1582330576166748800 evaluation starts
[758b 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bafcf0 signed by 0 principal evaluation starts (used [false])
[758c 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bafcf0 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[758d 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bafcf0 principal evaluation succeeds for identity 0
[758e 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bafcf0 gate 1582330576166748800 evaluation succeeds
[758f 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers
[7590 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[7591 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[7592 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[7593 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[7594 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [5212dd9294c4363e8eb596dd192c524cd31a383f3425cb7a266539da15d44073]
[7595 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[7596 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU [5212dd92] getting chaincode data for exp02 on channel businesschannel
[7597 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[7598 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[7599 02-22 00:16:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[759a 02-22 00:16:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[759b 02-22 00:16:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[759c 02-22 00:16:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[759d 02-22 00:16:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU [5212dd92] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[759e 02-22 00:16:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU [5212dd92] handling GET_STATE from chaincode
[759f 02-22 00:16:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU [5212dd92] getting state for chaincode exp02, key a, channel businesschannel
[75a0 02-22 00:16:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[75a1 02-22 00:16:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU [5212dd92] Completed GET_STATE. Sending RESPONSE
[75a2 02-22 00:16:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[75a3 02-22 00:16:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[75a4 02-22 00:16:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[75a5 02-22 00:16:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424343087800 seq_num:1582330572961002000 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[75a7 02-22 00:16:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424343087800 seq_num:1582330572961002000 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7 properties:ledger_height:7 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[75a8 02-22 00:16:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[75a6 02-22 00:16:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU [5212dd92] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[75a9 02-22 00:16:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU [5212dd92] notifying Txid:5212dd9294c4363e8eb596dd192c524cd31a383f3425cb7a266539da15d44073, channelID:businesschannel
[75aa 02-22 00:16:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[75ab 02-22 00:16:16.18 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: exp02 duration: 21ms channel=businesschannel txID=5212dd92
[75ac 02-22 00:16:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[75ad 02-22 00:16:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5212dd9294c4363e8eb596dd192c524cd31a383f3425cb7a266539da15d44073]
[75ae 02-22 00:16:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU escc for chaincode exp02 is escc channel=businesschannel txID=5212dd92
[75af 02-22 00:16:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20A08E3C7113E4C861021E98A915BE...455254494649434154452D2D2D2D2D0A
[75b0 02-22 00:16:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ECA64C48E9A3B15EDC2740C379AECC00A4484D4EB63559B9407E2DA367F70255
[75b1 02-22 00:16:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5212dd9294c4363e8eb596dd192c524cd31a383f3425cb7a266539da15d44073]
[75b2 02-22 00:16:16.19 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44976 grpc.code=OK grpc.call_duration=29.176ms
[75b3 02-22 00:16:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[75b4 02-22 00:16:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[75b5 02-22 00:16:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[75b6 02-22 00:16:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[75b7 02-22 00:16:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[75b8 02-22 00:16:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[75b9 02-22 00:16:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 cb 4e cb 14 ba cc 0a 90 99 58 b6 38 bc b5 a7 |..N.......X.8...|
00000010 9c ad a6 fe a4 01 43 6b b1 c3 64 ab 8f ea dd cf |......Ck..d.....|
[75ba 02-22 00:16:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 68 45 fd a3 a5 01 25 32 b7 e5 |0E.!..hE....%2..|
00000010 e1 5f d9 d4 18 4e a4 0f a2 9c a7 4b ef 4e 53 20 |._...N.....K.NS |
00000020 48 82 2e 72 44 02 20 13 0e af cd 37 ac 42 4f 88 |H..rD. ....7.BO.|
00000030 49 76 1c 4b e2 db a6 97 4d 57 ed 17 ac 56 4d b8 |Iv.K....MW...VM.|
00000040 1e 5d 66 93 2b 37 51 |.]f.+7Q|
[75bb 02-22 00:16:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[75bc 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c302f0 gate 1582330576200035200 evaluation starts
[75bd 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c302f0 signed by 0 principal evaluation starts (used [false])
[75be 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c302f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[75bf 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c302f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[75c0 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c302f0 principal evaluation fails
[75c1 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c302f0 gate 1582330576200035200 evaluation fails
[75c2 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[75c3 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[75c4 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[75c5 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 cb 4e cb 14 ba cc 0a 90 99 58 b6 38 bc b5 a7 |..N.......X.8...|
00000010 9c ad a6 fe a4 01 43 6b b1 c3 64 ab 8f ea dd cf |......Ck..d.....|
[75c6 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 68 45 fd a3 a5 01 25 32 b7 e5 |0E.!..hE....%2..|
00000010 e1 5f d9 d4 18 4e a4 0f a2 9c a7 4b ef 4e 53 20 |._...N.....K.NS |
00000020 48 82 2e 72 44 02 20 13 0e af cd 37 ac 42 4f 88 |H..rD. ....7.BO.|
00000030 49 76 1c 4b e2 db a6 97 4d 57 ed 17 ac 56 4d b8 |Iv.K....MW...VM.|
00000040 1e 5d 66 93 2b 37 51 |.]f.+7Q|
[75c7 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[75c8 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c30bf0 gate 1582330576203233000 evaluation starts
[75c9 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c30bf0 signed by 0 principal evaluation starts (used [false])
[75ca 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c30bf0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[75cb 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c30bf0 principal evaluation succeeds for identity 0
[75cc 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c30bf0 gate 1582330576203233000 evaluation succeeds
[75cd 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[75ce 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[75cf 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[75d0 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[75d1 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[75d2 02-22 00:16:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[75d3 02-22 00:16:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[75d4 02-22 00:16:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[75d5 02-22 00:16:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:44980
[75d6 02-22 00:16:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel=businesschannel txID=ec93bc61 mspID=Org1MSP
[75d7 02-22 00:16:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a 40 a0 77 9c 6b 28 4d b0 6b 95 24 c0 88 ae b1 |.@.w.k(M.k.$....|
00000010 1f 09 3f 3b 15 b6 2a f2 2d a3 74 11 ad 38 76 ea |..?;..*.-.t..8v.|
[75d8 02-22 00:16:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 59 14 a4 9a 9a 8d a2 a5 12 25 7c |0D. .Y........%||
00000010 40 d6 af de fd 12 bf de 4b 3b ba 83 1e 15 f4 0b |@.......K;......|
00000020 5e 23 04 2d 02 20 44 40 a5 b8 f6 e7 b8 ec 55 c1 |^#.-. D@......U.|
00000030 61 ab 31 f4 ca 7c 17 87 3d f1 01 a2 c0 c8 d5 a7 |a.1..|..=.......|
00000040 46 cc 9e 08 24 2f |F...$/|
[75d9 02-22 00:16:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel=businesschannel txID=ec93bc61 mspID=Org1MSP
[75da 02-22 00:16:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ec93bc619402d30222fdc4c672d5024084176a77e6ae08f63f1df3a0fb35cb4e]
[75db 02-22 00:16:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x65, 0x63, 0x39, 0x33, 0x62, 0x63, 0x36, 0x31, 0x39, 0x34, 0x30, 0x32, 0x64, 0x33, 0x30, 0x32, 0x32, 0x32, 0x66, 0x64, 0x63, 0x34, 0x63, 0x36, 0x37, 0x32, 0x64, 0x35, 0x30, 0x32, 0x34, 0x30, 0x38, 0x34, 0x31, 0x37, 0x36, 0x61, 0x37, 0x37, 0x65, 0x36, 0x61, 0x65, 0x30, 0x38, 0x66, 0x36, 0x33, 0x66, 0x31, 0x64, 0x66, 0x33, 0x61, 0x30, 0x66, 0x62, 0x33, 0x35, 0x63, 0x62, 0x34, 0x65}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x65, 0x63, 0x39, 0x33, 0x62, 0x63, 0x36, 0x31, 0x39, 0x34, 0x30, 0x32, 0x64, 0x33, 0x30, 0x32, 0x32, 0x32, 0x66, 0x64, 0x63, 0x34, 0x63, 0x36, 0x37, 0x32, 0x64, 0x35, 0x30, 0x32, 0x34, 0x30, 0x38, 0x34, 0x31, 0x37, 0x36, 0x61, 0x37, 0x37, 0x65, 0x36, 0x61, 0x65, 0x30, 0x38, 0x66, 0x36, 0x33, 0x66, 0x31, 0x64, 0x66, 0x33, 0x61, 0x30, 0x66, 0x62, 0x33, 0x35, 0x63, 0x62, 0x34, 0x65, 0xff}]
[75dc 02-22 00:16:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose
[75dd 02-22 00:16:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[75de 02-22 00:16:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[75df 02-22 00:16:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[75e0 02-22 00:16:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[75e1 02-22 00:16:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a 40 a0 77 9c 6b 28 4d b0 6b 95 24 c0 88 ae b1 |.@.w.k(M.k.$....|
00000010 1f 09 3f 3b 15 b6 2a f2 2d a3 74 11 ad 38 76 ea |..?;..*.-.t..8v.|
[75e2 02-22 00:16:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 59 14 a4 9a 9a 8d a2 a5 12 25 7c |0D. .Y........%||
00000010 40 d6 af de fd 12 bf de 4b 3b ba 83 1e 15 f4 0b |@.......K;......|
00000020 5e 23 04 2d 02 20 44 40 a5 b8 f6 e7 b8 ec 55 c1 |^#.-. D@......U.|
00000030 61 ab 31 f4 ca 7c 17 87 3d f1 01 a2 c0 c8 d5 a7 |a.1..|..=.......|
00000040 46 cc 9e 08 24 2f |F...$/|
[75e3 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[75e4 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8e7d0 gate 1582330576480148100 evaluation starts
[75e5 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8e7d0 signed by 0 principal evaluation starts (used [false])
[75e6 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8e7d0 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[75e7 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8e7d0 principal evaluation succeeds for identity 0
[75e8 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8e7d0 gate 1582330576480148100 evaluation succeeds
[75e9 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers
[75ea 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[75eb 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[75ec 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[75ed 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[75ee 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [ec93bc619402d30222fdc4c672d5024084176a77e6ae08f63f1df3a0fb35cb4e]
[75ef 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[75f0 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU [ec93bc61] getting chaincode data for exp02 on channel businesschannel
[75f1 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[75f2 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[75f3 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[75f4 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU [ec93bc61] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[75f5 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU [ec93bc61] handling GET_STATE from chaincode
[75f6 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU [ec93bc61] getting state for chaincode exp02, key a, channel businesschannel
[75f7 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[75f8 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU [ec93bc61] Completed GET_STATE. Sending RESPONSE
[75f9 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU [ec93bc61] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[75fa 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU [ec93bc61] handling GET_STATE from chaincode
[75fb 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU [ec93bc61] getting state for chaincode exp02, key b, channel businesschannel
[75fc 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b
[75fd 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU [ec93bc61] Completed GET_STATE. Sending RESPONSE
[75fe 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU [ec93bc61] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[75ff 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU [ec93bc61] handling PUT_STATE from chaincode
[7600 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU [ec93bc61] Completed PUT_STATE. Sending RESPONSE
[7601 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU [ec93bc61] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[7602 02-22 00:16:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU [ec93bc61] handling PUT_STATE from chaincode
[7603 02-22 00:16:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU [ec93bc61] Completed PUT_STATE. Sending RESPONSE
[7604 02-22 00:16:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU [ec93bc61] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[7605 02-22 00:16:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU [ec93bc61] notifying Txid:ec93bc619402d30222fdc4c672d5024084176a77e6ae08f63f1df3a0fb35cb4e, channelID:businesschannel
[7606 02-22 00:16:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[7607 02-22 00:16:16.49 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: exp02 duration: 10ms channel=businesschannel txID=ec93bc61
[7608 02-22 00:16:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[7609 02-22 00:16:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ec93bc619402d30222fdc4c672d5024084176a77e6ae08f63f1df3a0fb35cb4e]
[760a 02-22 00:16:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU escc for chaincode exp02 is escc channel=businesschannel txID=ec93bc61
[760b 02-22 00:16:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2055ED4D5F3ED1C7E171618811DCBE...455254494649434154452D2D2D2D2D0A
[760c 02-22 00:16:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D0CC8451EA703A1B3934104DC959F33AD280AFFE9D0291A6C3763815FEE41CBC
[760d 02-22 00:16:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ec93bc619402d30222fdc4c672d5024084176a77e6ae08f63f1df3a0fb35cb4e]
[760e 02-22 00:16:16.49 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44980 grpc.code=OK grpc.call_duration=19.0305ms
[760f 02-22 00:16:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7610 02-22 00:16:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7611 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:44986
[7612 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel=businesschannel txID=62fe30dc mspID=Org2MSP
[7613 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 da 97 a1 8c 5d 8f bb 7a 3e 1c 53 4f 21 d9 44 b3 |....]..z>.SO!.D.|
00000010 c6 e9 b4 b2 54 5e e2 af 73 3d e3 70 2a 73 b1 ea |....T^..s=.p*s..|
[7614 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 df f8 3e c2 65 7b 19 80 d3 8c 12 |0D. h..>.e{.....|
00000010 16 29 a6 fc fd f2 03 b6 ac c1 b7 54 e0 84 e9 39 |.).........T...9|
00000020 9b 6e 3d c7 02 20 10 57 e0 49 2d db 2b a6 5b d3 |.n=.. .W.I-.+.[.|
00000030 aa 84 ae a0 e9 89 16 bf 43 97 da 51 bb 3f 16 d2 |........C..Q.?..|
00000040 fa 33 9a c1 34 e9 |.3..4.|
[7615 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel=businesschannel txID=62fe30dc mspID=Org2MSP
[7616 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [62fe30dc00325ba65996725dad8fa457dd224d9e259a1eecd1a434f49428f816]
[7617 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x36, 0x32, 0x66, 0x65, 0x33, 0x30, 0x64, 0x63, 0x30, 0x30, 0x33, 0x32, 0x35, 0x62, 0x61, 0x36, 0x35, 0x39, 0x39, 0x36, 0x37, 0x32, 0x35, 0x64, 0x61, 0x64, 0x38, 0x66, 0x61, 0x34, 0x35, 0x37, 0x64, 0x64, 0x32, 0x32, 0x34, 0x64, 0x39, 0x65, 0x32, 0x35, 0x39, 0x61, 0x31, 0x65, 0x65, 0x63, 0x64, 0x31, 0x61, 0x34, 0x33, 0x34, 0x66, 0x34, 0x39, 0x34, 0x32, 0x38, 0x66, 0x38, 0x31, 0x36}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x36, 0x32, 0x66, 0x65, 0x33, 0x30, 0x64, 0x63, 0x30, 0x30, 0x33, 0x32, 0x35, 0x62, 0x61, 0x36, 0x35, 0x39, 0x39, 0x36, 0x37, 0x32, 0x35, 0x64, 0x61, 0x64, 0x38, 0x66, 0x61, 0x34, 0x35, 0x37, 0x64, 0x64, 0x32, 0x32, 0x34, 0x64, 0x39, 0x65, 0x32, 0x35, 0x39, 0x61, 0x31, 0x65, 0x65, 0x63, 0x64, 0x31, 0x61, 0x34, 0x33, 0x34, 0x66, 0x34, 0x39, 0x34, 0x32, 0x38, 0x66, 0x38, 0x31, 0x36, 0xff}]
[7618 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose
[7619 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[761a 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[761b 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[761c 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[761d 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 da 97 a1 8c 5d 8f bb 7a 3e 1c 53 4f 21 d9 44 b3 |....]..z>.SO!.D.|
00000010 c6 e9 b4 b2 54 5e e2 af 73 3d e3 70 2a 73 b1 ea |....T^..s=.p*s..|
[761e 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 df f8 3e c2 65 7b 19 80 d3 8c 12 |0D. h..>.e{.....|
00000010 16 29 a6 fc fd f2 03 b6 ac c1 b7 54 e0 84 e9 39 |.).........T...9|
00000020 9b 6e 3d c7 02 20 10 57 e0 49 2d db 2b a6 5b d3 |.n=.. .W.I-.+.[.|
00000030 aa 84 ae a0 e9 89 16 bf 43 97 da 51 bb 3f 16 d2 |........C..Q.?..|
00000040 fa 33 9a c1 34 e9 |.3..4.|
[761f 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7620 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cec420 gate 1582330576725888500 evaluation starts
[7621 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cec420 signed by 0 principal evaluation starts (used [false])
[7622 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cec420 processing identity 0 - &{Org2MSP 44c87d6d29f5a901134fda071a7edf7126a7788becd3944cea03a9d24174d773}
[7623 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cec420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7624 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cec420 principal evaluation fails
[7625 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cec420 gate 1582330576725888500 evaluation fails
[7626 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers
[7627 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[7628 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==
[7629 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 da 97 a1 8c 5d 8f bb 7a 3e 1c 53 4f 21 d9 44 b3 |....]..z>.SO!.D.|
00000010 c6 e9 b4 b2 54 5e e2 af 73 3d e3 70 2a 73 b1 ea |....T^..s=.p*s..|
[762a 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 df f8 3e c2 65 7b 19 80 d3 8c 12 |0D. h..>.e{.....|
00000010 16 29 a6 fc fd f2 03 b6 ac c1 b7 54 e0 84 e9 39 |.).........T...9|
00000020 9b 6e 3d c7 02 20 10 57 e0 49 2d db 2b a6 5b d3 |.n=.. .W.I-.+.[.|
00000030 aa 84 ae a0 e9 89 16 bf 43 97 da 51 bb 3f 16 d2 |........C..Q.?..|
00000040 fa 33 9a c1 34 e9 |.3..4.|
[762b 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[762c 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cecd40 gate 1582330576727110900 evaluation starts
[762d 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cecd40 signed by 0 principal evaluation starts (used [false])
[762e 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cecd40 processing identity 0 - &{Org2MSP 44c87d6d29f5a901134fda071a7edf7126a7788becd3944cea03a9d24174d773}
[762f 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP
[7630 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[7631 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cecd40 principal evaluation succeeds for identity 0
[7632 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cecd40 gate 1582330576727110900 evaluation succeeds
[7633 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers
[7634 02-22 00:16:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers
[7635 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[7636 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[7637 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[7638 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [62fe30dc00325ba65996725dad8fa457dd224d9e259a1eecd1a434f49428f816]
[7639 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[763a 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU [62fe30dc] getting chaincode data for exp02 on channel businesschannel
[763b 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[763c 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[763d 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[763e 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU [62fe30dc] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[763f 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU [62fe30dc] handling GET_STATE from chaincode
[7640 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU [62fe30dc] getting state for chaincode exp02, key a, channel businesschannel
[7641 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[7642 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU [62fe30dc] Completed GET_STATE. Sending RESPONSE
[7643 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU [62fe30dc] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[7644 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU [62fe30dc] notifying Txid:62fe30dc00325ba65996725dad8fa457dd224d9e259a1eecd1a434f49428f816, channelID:businesschannel
[7645 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[7646 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: exp02 duration: 2ms channel=businesschannel txID=62fe30dc
[7647 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[7648 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [62fe30dc00325ba65996725dad8fa457dd224d9e259a1eecd1a434f49428f816]
[7649 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU escc for chaincode exp02 is escc channel=businesschannel txID=62fe30dc
[764a 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20DF568A0A61428BF4078D36E98E84...455254494649434154452D2D2D2D2D0A
[764b 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 75F52EDA81D3CC928C7EFC2795A4B0F9C12A9D7643D7E31708DE52837FE1AA3A
[764c 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [62fe30dc00325ba65996725dad8fa457dd224d9e259a1eecd1a434f49428f816]
[764d 02-22 00:16:16.73 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44986 grpc.code=OK grpc.call_duration=12.4214ms
[764e 02-22 00:16:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[764f 02-22 00:16:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7650 02-22 00:16:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:15622712305624809895 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7651 02-22 00:16:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:15622712305624809895 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7652 02-22 00:16:18.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7653 02-22 00:16:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7654 02-22 00:16:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7655 02-22 00:16:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7656 02-22 00:16:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7657 02-22 00:16:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7658 02-22 00:16:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[7659 02-22 00:16:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[765a 02-22 00:16:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[765b 02-22 00:16:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[765c 02-22 00:16:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[765d 02-22 00:16:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[765e 02-22 00:16:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 00 74 ef 7b 90 00 8e e4 eb e8 f2 3f f8 47 22 |..t.{.......?.G"|
00000010 ee e4 92 5f 53 b6 91 70 05 5d 8e 65 aa 65 5d 81 |..._S..p.].e.e].|
[765f 02-22 00:16:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 65 24 44 29 38 77 d4 b0 fc 4c |0E.!..e$D)8w...L|
00000010 e4 7b 46 3c c1 03 21 62 a0 c7 c1 58 37 b0 22 46 |.{F<..!b...X7."F|
00000020 0c 35 f8 ba cc 02 20 4b 77 f0 49 48 b7 f3 31 43 |.5.... Kw.IH..1C|
00000030 51 40 18 6c ac 74 c8 a7 71 c7 0e 26 43 54 a6 4c |Q@.l.t..q..&CT.L|
00000040 26 17 c5 d5 b7 21 48 |&....!H|
[7660 02-22 00:16:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[7661 02-22 00:16:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f a7 30 df d8 21 b6 de 9a fd 05 02 |0D. _.0..!......|
00000010 5a 9a 68 84 4c 68 09 f4 62 f2 16 83 72 53 7b b4 |Z.h.Lh..b...rS{.|
00000020 fb bc d2 18 02 20 68 6e d0 e2 57 eb ea d6 c3 99 |..... hn..W.....|
00000030 e7 c5 cc 1e b1 8a 27 88 7a 19 75 d8 50 e7 b8 b5 |......'.z.u.P...|
00000040 ef 20 f7 b5 f4 4a |. ...J|
[7662 02-22 00:16:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[7663 02-22 00:16:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[7664 02-22 00:16:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:87
[7665 02-22 00:16:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:87
[7666 02-22 00:16:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[7667 02-22 00:16:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7668 02-22 00:16:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7669 02-22 00:16:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[766a 02-22 00:16:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[766b 02-22 00:16:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[766c 02-22 00:16:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[766d 02-22 00:16:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[766e 02-22 00:16:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[766f 02-22 00:16:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[7670 02-22 00:16:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7671 02-22 00:16:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:1348419496789656995 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7672 02-22 00:16:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1348419496789656995 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7673 02-22 00:16:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[7674 02-22 00:16:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7675 02-22 00:16:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:5060367947585449844 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7676 02-22 00:16:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:5060367947585449844 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7677 02-22 00:16:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:5060367947585449844 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7678 02-22 00:16:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7679 02-22 00:16:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[767a 02-22 00:16:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[767b 02-22 00:16:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[767c 02-22 00:16:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[767d 02-22 00:16:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[767e 02-22 00:16:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[767f 02-22 00:16:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7680 02-22 00:16:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[7681 02-22 00:16:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2450582882101229471 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[7682 02-22 00:16:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[7683 02-22 00:16:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:13036236687427937934 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[7684 02-22 00:16:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[7685 02-22 00:16:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2450582882101229471 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7686 02-22 00:16:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7687 02-22 00:16:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:1190458458423264989 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[7688 02-22 00:16:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:1190458458423264989 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7689 02-22 00:16:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:13036236687427937934 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[768a 02-22 00:16:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[768b 02-22 00:16:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[768c 02-22 00:16:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1190458458423264989 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[768d 02-22 00:16:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1190458458423264989 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[768e 02-22 00:16:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1190458458423264989 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[768f 02-22 00:16:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7690 02-22 00:16:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2450582882101229471 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[7691 02-22 00:16:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2450582882101229471 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[7692 02-22 00:16:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7693 02-22 00:16:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13036236687427937934 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[7694 02-22 00:16:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13036236687427937934 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[7695 02-22 00:16:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7696 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7697 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7698 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7699 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[769a 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[769b 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[769c 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[769d 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[769e 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[769f 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[76a0 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[76a1 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[76a2 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 d7 35 75 75 ce 00 f5 27 19 f0 17 49 d0 36 78 |..5uu...'...I.6x|
00000010 5d cf 2c 52 78 4b 55 76 5b d0 15 0e d4 2c b0 32 |].,RxKUv[....,.2|
[76a3 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 22 3d 13 18 fe bc d8 5f fa 3b 18 |0D. y"=....._.;.|
00000010 2d 68 c1 9b f1 32 3a 55 6b d5 87 1a 78 10 51 54 |-h...2:Uk...x.QT|
00000020 30 9e 78 22 02 20 32 b2 e9 54 07 c5 5b bf 75 e4 |0.x". 2..T..[.u.|
00000030 33 20 c8 7d 5f fa 4c 37 a3 61 c0 30 7d ed 77 b6 |3 .}_.L7.a.0}.w.|
00000040 4a 0f 8d a5 cb a1 |J.....|
[76a4 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[76a5 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d657e0 gate 1582330578464986600 evaluation starts
[76a6 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d657e0 signed by 0 principal evaluation starts (used [false])
[76a7 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d657e0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[76a8 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d657e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[76a9 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d657e0 principal evaluation fails
[76aa 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d657e0 gate 1582330578464986600 evaluation fails
[76ab 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[76ac 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[76ad 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[76ae 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 d7 35 75 75 ce 00 f5 27 19 f0 17 49 d0 36 78 |..5uu...'...I.6x|
00000010 5d cf 2c 52 78 4b 55 76 5b d0 15 0e d4 2c b0 32 |].,RxKUv[....,.2|
[76af 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 22 3d 13 18 fe bc d8 5f fa 3b 18 |0D. y"=....._.;.|
00000010 2d 68 c1 9b f1 32 3a 55 6b d5 87 1a 78 10 51 54 |-h...2:Uk...x.QT|
00000020 30 9e 78 22 02 20 32 b2 e9 54 07 c5 5b bf 75 e4 |0.x". 2..T..[.u.|
00000030 33 20 c8 7d 5f fa 4c 37 a3 61 c0 30 7d ed 77 b6 |3 .}_.L7.a.0}.w.|
00000040 4a 0f 8d a5 cb a1 |J.....|
[76b0 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[76b1 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7c0e0 gate 1582330578466908200 evaluation starts
[76b2 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7c0e0 signed by 0 principal evaluation starts (used [false])
[76b3 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7c0e0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[76b4 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7c0e0 principal evaluation succeeds for identity 0
[76b5 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7c0e0 gate 1582330578466908200 evaluation succeeds
[76b6 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[76b7 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[76b8 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[76b9 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[76ba 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes
[76bb 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes]}
[76bc 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:86
[76bd 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:86
[76be 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:85 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[76bf 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[76c0 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[76c1 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[76c2 02-22 00:16:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[76c3 02-22 00:16:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76c4 02-22 00:16:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76c5 02-22 00:16:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76c6 02-22 00:16:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[76c7 02-22 00:16:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[76c8 02-22 00:16:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[76c9 02-22 00:16:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[76ca 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[76cb 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[76cc 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[76cd 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[76ce 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[76cf 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 5c 4f be 0f 9f d6 22 28 08 42 98 22 64 04 85 |.\O...."(.B."d..|
00000010 48 a7 05 d2 70 fb 3d 22 0d b2 ec 2b cd 63 7b 13 |H...p.="...+.c{.|
[76d0 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 af 95 94 4d fa cf ae 2e 72 b0 47 |0D. ....M....r.G|
00000010 32 6c 73 fb bf 5d 07 de bb 6d 43 7c 09 2b 33 93 |2ls..]...mC|.+3.|
00000020 26 e1 3f 34 02 20 46 27 06 79 d5 44 92 4c a9 e7 |&.?4. F'.y.D.L..|
00000030 a7 bc ea 48 44 7f 07 79 da 2e 49 d5 cb 88 33 2f |...HD..y..I...3/|
00000040 b3 c1 f9 37 07 3a |...7.:|
[76d1 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[76d2 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7d9f0 gate 1582330578527358100 evaluation starts
[76d3 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7d9f0 signed by 0 principal evaluation starts (used [false])
[76d4 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7d9f0 processing identity 0 - &{OrdererMSP 9de2412befbda85787d990eb15cf69142545cfd8abf27ca5a151a46e885ec6cd}
[76d5 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7d9f0 principal evaluation succeeds for identity 0
[76d6 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d7d9f0 gate 1582330578527358100 evaluation succeeds
[76d7 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[76d8 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[76d9 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[76da 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[76db 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [7] channel=businesschannel
[76dc 02-22 00:16:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [7]
[76dd 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks
[76df 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [7] channel=businesschannel
[76e0 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4044 bytes, seq: 7}, Envelope: 4074 bytes, Signature: 0 bytes to the block puller
[76de 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [7]
[76e2 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [7] with 1 transaction(s) to the ledger
[76e1 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Added 7, total items: 7
[76e3 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [7] from buffer
[76e4 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [7]
[76e5 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [7]
[76e6 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0047fbf00 env 0xc004d15860 txn 0
[76e8 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004d15860
[76e9 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\320\345\301\362\005\020\214\204\326\342\001\"\017businesschannel*@ec93bc619402d30222fdc4c672d5024084176a77e6ae08f63f1df3a0fb35cb4e:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQYQmDCQAwHI0jFExt0EW9ijAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABIy/vTtI3V79\n2rcWfB+nRBVt6ez+Mgz7ZjGmibYIUrH2tBAuomci46aS54r3139Dg6A1Jl8G8nj/\n5qxC2bJ3U/CjTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAINMuFb3GQi3UqZWoThik9OYXCYkVHqKlZhEIVm/qe8jRMAoGCCqGSM49\nBAMCA0gAMEUCIQD51jpG/bmP7/921BpFlVDF10gMYDzARqRbkfv84NM0vwIgIWtC\nXaqnq5GV16yVvuxgw6xr3uLKOdgZjaJ5KL5zoac=\n-----END CERTIFICATE-----\n\022\030\303\200V\316\266\243/\036R\001\204\330\001\265\260\363\323Z\235\241\355X\345\024"
[76eb 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3
[76ec 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[76ed 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[76ea 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76e7 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[76ee 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[76ef 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[76f1 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 92 00 27 5f 01 8a 2a 30 b7 17 60 70 db 73 fd |+..'_..*0..`p.s.|
00000010 01 8a 8b e3 60 bc 9f cb 02 76 00 ee dc e9 c3 fb |....`....v......|
[76f2 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 71 ea b3 08 d5 bf 5f cd c3 99 10 |0D. qq....._....|
00000010 73 15 cc e9 9b 72 f8 8a 6d 08 49 67 86 b8 d4 92 |s....r..m.Ig....|
00000020 de 28 64 a0 02 20 13 b5 7c c3 84 d8 63 21 39 ea |.(d.. ..|...c!9.|
00000030 e1 ad 9c ed 5f 75 71 c3 1c 5e 0c d1 39 a9 cc c7 |...._uq..^..9...|
00000040 1a ff ae 45 fe fd |...E..|
[76f3 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[76f4 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc004dac000, header channel_header:"\010\003\032\014\010\320\345\301\362\005\020\214\204\326\342\001\"\017businesschannel*@ec93bc619402d30222fdc4c672d5024084176a77e6ae08f63f1df3a0fb35cb4e:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQYQmDCQAwHI0jFExt0EW9ijAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABIy/vTtI3V79\n2rcWfB+nRBVt6ez+Mgz7ZjGmibYIUrH2tBAuomci46aS54r3139Dg6A1Jl8G8nj/\n5qxC2bJ3U/CjTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAINMuFb3GQi3UqZWoThik9OYXCYkVHqKlZhEIVm/qe8jRMAoGCCqGSM49\nBAMCA0gAMEUCIQD51jpG/bmP7/921BpFlVDF10gMYDzARqRbkfv84NM0vwIgIWtC\nXaqnq5GV16yVvuxgw6xr3uLKOdgZjaJ5KL5zoac=\n-----END CERTIFICATE-----\n\022\030\303\200V\316\266\243/\036R\001\204\330\001\265\260\363\323Z\235\241\355X\345\024"
[76f5 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions
[76f0 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76f6 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid
[76f8 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s(<nil>)
[76f9 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[76fa 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ec93bc619402d30222fdc4c672d5024084176a77e6ae08f63f1df3a0fb35cb4e]
[76fb 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x65, 0x63, 0x39, 0x33, 0x62, 0x63, 0x36, 0x31, 0x39, 0x34, 0x30, 0x32, 0x64, 0x33, 0x30, 0x32, 0x32, 0x32, 0x66, 0x64, 0x63, 0x34, 0x63, 0x36, 0x37, 0x32, 0x64, 0x35, 0x30, 0x32, 0x34, 0x30, 0x38, 0x34, 0x31, 0x37, 0x36, 0x61, 0x37, 0x37, 0x65, 0x36, 0x61, 0x65, 0x30, 0x38, 0x66, 0x36, 0x33, 0x66, 0x31, 0x64, 0x66, 0x33, 0x61, 0x30, 0x66, 0x62, 0x33, 0x35, 0x63, 0x62, 0x34, 0x65}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x65, 0x63, 0x39, 0x33, 0x62, 0x63, 0x36, 0x31, 0x39, 0x34, 0x30, 0x32, 0x64, 0x33, 0x30, 0x32, 0x32, 0x32, 0x66, 0x64, 0x63, 0x34, 0x63, 0x36, 0x37, 0x32, 0x64, 0x35, 0x30, 0x32, 0x34, 0x30, 0x38, 0x34, 0x31, 0x37, 0x36, 0x61, 0x37, 0x37, 0x65, 0x36, 0x61, 0x65, 0x30, 0x38, 0x66, 0x36, 0x33, 0x66, 0x31, 0x64, 0x66, 0x33, 0x61, 0x30, 0x66, 0x62, 0x33, 0x35, 0x63, 0x62, 0x34, 0x65, 0xff}]
[76fc 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction with plugins
[76fd 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch starts for bytes 0xc004da2000
[76f7 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76ff 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[76fe 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [0e5450c3-3ca6-4edf-a528-9e9d98b2f29c]
[7700 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[7701 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4044 bytes, seq: 7}, Envelope: 4074 bytes, Signature: 0 bytes to 1 peers
[7702 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[7703 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo
[7704 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7705 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo
[7707 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections
[7708 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0e5450c3-3ca6-4edf-a528-9e9d98b2f29c]
[7709 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx ec93bc619402d30222fdc4c672d5024084176a77e6ae08f63f1df3a0fb35cb4e, seq 0 out of 1 in block 7 for channel businesschannel with validation plugin vscc with plugin
[770a 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [d7b9fd3e-816b-4fa3-9188-1724999e0734]
[7706 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[770b 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4044 bytes, seq: 7}, Envelope: 4074 bytes, Signature: 0 bytes
[770d 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[770c 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d7b9fd3e-816b-4fa3-9188-1724999e0734]
[770e 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 cc 84 51 ea 70 3a 1b 39 34 10 4d c9 59 f3 3a |...Q.p:.94.M.Y.:|
00000010 d2 80 af fe 9d 02 91 a6 c3 76 38 15 fe e4 1c bc |.........v8.....|
[770f 02-22 00:16:18.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 39 30 21 43 61 b8 e2 80 69 55 fa |0D. d90!Ca...iU.|
00000010 35 98 c7 54 98 15 4c 82 22 d8 53 ec c0 6d b4 c6 |5..T..L.".S..m..|
00000020 c5 81 69 45 02 20 39 2f 5f 3b ff 6a 72 90 53 b8 |..iE. 9/_;.jr.S.|
00000030 28 07 e2 df 5b ff de f0 20 b5 d2 59 eb 96 24 69 |(...[... ..Y..$i|
00000040 b2 fc 01 d5 81 b5 |......|
[7710 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7711 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9d8e0 gate 1582330578540280300 evaluation starts
[7712 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9d8e0 signed by 0 principal evaluation starts (used [false])
[7713 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9d8e0 processing identity 0 - &{Org1MSP 7d0df2506ac221e9752cec5e841f5c7482dfa0c77748a65771953394012282dd}
[7714 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9d8e0 principal evaluation succeeds for identity 0
[7715 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9d8e0 signed by 1 principal evaluation starts (used [true])
[7716 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9d8e0 skipping identity 0 because it has already been used
[7717 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9d8e0 principal evaluation fails
[7718 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9d8e0 gate 1582330578540280300 evaluation succeeds
[7719 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [811923f9-ff57-4de1-9ee6-b4cf22ef7670]
[771a 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [811923f9-ff57-4de1-9ee6-b4cf22ef7670]
[771b 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU block 7, namespace: exp02, tx 0 validation results is: <nil>
[771c 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction ec93bc619402d30222fdc4c672d5024084176a77e6ae08f63f1df3a0fb35cb4e appears to be valid
[771d 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch completes env bytes 0xc004da2000
[771e 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0047fbf00 env 0xc004d15860 txn 0
[771f 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[7720 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [7] in 16ms
[7721 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[7722 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 0 private write sets from cache. channel=businesschannel
[7723 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from transient store channel=businesschannel
[7724 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [7] channel=businesschannel
[7725 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [7]
[7726 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[7727 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[7728 02-22 00:16:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[7729 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [7]
[772a 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[772b 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION
[772c 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[772d 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}
[772e 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[772f 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}
[7730 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[7731 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}
[7732 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b
[7733 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}
[7734 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Block [7] Transaction index [0] TxId [ec93bc619402d30222fdc4c672d5024084176a77e6ae08f63f1df3a0fb35cb4e] marked as valid by state validator. ContainsPostOrderWrites [false]
[7735 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc004d09200), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc004d09240)}
[7736 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[7737 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[7738 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[7739 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [7]
[773a 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [7] to storage
[773b 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [7] to pvt block store
[773c 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [7]
[773d 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151053
[773e 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2E9C4605837A895ABF8F277692B5621F5F7E85C51A0AF1570546C145C1ADAAE3
[773f 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[7740 02-22 00:16:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[7741 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[7742 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7743 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[7744 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7745 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[7746 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[7747 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7748 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [7]
[7749 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[774a 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[774b 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=7, blockHash=[]byte{0x66, 0x1b, 0x26, 0xd1, 0xdf, 0x13, 0xf3, 0xf4, 0x4, 0xa6, 0x3f, 0xc6, 0x28, 0x54, 0xef, 0xec, 0xf4, 0x9c, 0xfe, 0xa8, 0xd6, 0x1c, 0x5a, 0x17, 0xfb, 0xd8, 0x2f, 0xfd, 0x16, 0x9e, 0x6e, 0xd0} txOffsets=
txId=ec93bc619402d30222fdc4c672d5024084176a77e6ae08f63f1df3a0fb35cb4e locPointer=offset=70, bytesLength=3035
]
[774c 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97583, bytesLength=3035] for tx ID: [ec93bc619402d30222fdc4c672d5024084176a77e6ae08f63f1df3a0fb35cb4e] to txid-index
[774d 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97583, bytesLength=3035] for tx number:[0] ID: [ec93bc619402d30222fdc4c672d5024084176a77e6ae08f63f1df3a0fb35cb4e] to blockNumTranNum index
[774e 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[774f 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7750 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[101579], isChainEmpty=[false], lastBlockNumber=[7]
[7751 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [7] transactions to state database
[7752 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[7753 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[7754 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[7755 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[7756 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dexp02a] key(bytes)=[[]byte{0x64, 0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]
[7757 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dexp02b] key(bytes)=[[]byte{0x64, 0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]
[7758 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[7759 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [8]
[775a 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}]
[775b 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [8]
[775c 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[775d 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [7] transactions to history database
[775e 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [7] with [1] transactions
[775f 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [7]
[7760 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [7] with 1 transaction(s) in 18ms (state_validation=5ms block_and_pvtdata_commit=8ms state_commit=2ms) commitHash=[5ac08dc4bbd7b6b60de7f8ccba395da413070a7fb08d90e2e203dfa571c2d921]
[7761 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A7B121408ACB284A6AEA4E4FA15...0F0A0A5F6C6966656379636C65120131
[7762 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 758F1678F81C6ACB49B6DF8B1B6A8E4CC1E35F9CFFB67653D65F18BA1A141411
[7763 02-22 00:16:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [7] with 1 transaction(s)
[7764 02-22 00:16:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[7765 02-22 00:16:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[7766 02-22 00:16:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7767 02-22 00:16:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[7768 02-22 00:16:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[7769 02-22 00:16:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 9c 46 05 83 7a 89 5a bf 8f 27 76 92 b5 62 1f |..F..z.Z..'v..b.|
00000010 5f 7e 85 c5 1a 0a f1 57 05 46 c1 45 c1 ad aa e3 |_~.....W.F.E....|
[776a 02-22 00:16:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 27 00 84 66 a9 58 f1 8d e0 51 |0E.!..'..f.X...Q|
00000010 7f 5f 6e d6 18 5e d5 24 3b b2 ca 43 38 2f a7 ea |._n..^.$;..C8/..|
00000020 ad 18 26 1e 4c 02 20 3e 86 d8 5b 15 f7 32 79 ef |..&.L. >..[..2y.|
00000030 f9 b6 6e 0d bc 87 9b 44 b0 d4 bb 40 69 5a 9a bf |..n....D...@iZ..|
00000040 ee e8 87 de 20 1a 9a |.... ..|
[776b 02-22 00:16:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes
[776c 02-22 00:16:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes
[776d 02-22 00:16:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[776e 02-22 00:16:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[776f 02-22 00:16:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 00 74 ef 7b 90 00 8e e4 eb e8 f2 3f f8 47 22 |..t.{.......?.G"|
00000010 ee e4 92 5f 53 b6 91 70 05 5d 8e 65 aa 65 5d 81 |..._S..p.].e.e].|
[7770 02-22 00:16:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 65 24 44 29 38 77 d4 b0 fc 4c |0E.!..e$D)8w...L|
00000010 e4 7b 46 3c c1 03 21 62 a0 c7 c1 58 37 b0 22 46 |.{F<..!b...X7."F|
00000020 0c 35 f8 ba cc 02 20 4b 77 f0 49 48 b7 f3 31 43 |.5.... Kw.IH..1C|
00000030 51 40 18 6c ac 74 c8 a7 71 c7 0e 26 43 54 a6 4c |Q@.l.t..q..&CT.L|
00000040 26 17 c5 d5 b7 21 48 |&....!H|
[7771 02-22 00:16:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes
[7772 02-22 00:16:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7773 02-22 00:16:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7774 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[7775 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7776 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[7777 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[7778 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7779 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[777a 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[777b 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[777c 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[777d 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[777e 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[777f 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 d7 35 75 75 ce 00 f5 27 19 f0 17 49 d0 36 78 |..5uu...'...I.6x|
00000010 5d cf 2c 52 78 4b 55 76 5b d0 15 0e d4 2c b0 32 |].,RxKUv[....,.2|
[7780 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 22 3d 13 18 fe bc d8 5f fa 3b 18 |0D. y"=....._.;.|
00000010 2d 68 c1 9b f1 32 3a 55 6b d5 87 1a 78 10 51 54 |-h...2:Uk...x.QT|
00000020 30 9e 78 22 02 20 32 b2 e9 54 07 c5 5b bf 75 e4 |0.x". 2..T..[.u.|
00000030 33 20 c8 7d 5f fa 4c 37 a3 61 c0 30 7d ed 77 b6 |3 .}_.L7.a.0}.w.|
00000040 4a 0f 8d a5 cb a1 |J.....|
[7781 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7782 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e41da0 gate 1582330578585646400 evaluation starts
[7783 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e41da0 signed by 0 principal evaluation starts (used [false])
[7784 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e41da0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7785 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e41da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7786 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e41da0 principal evaluation fails
[7787 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e41da0 gate 1582330578585646400 evaluation fails
[7788 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7789 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[778a 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[778b 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 d7 35 75 75 ce 00 f5 27 19 f0 17 49 d0 36 78 |..5uu...'...I.6x|
00000010 5d cf 2c 52 78 4b 55 76 5b d0 15 0e d4 2c b0 32 |].,RxKUv[....,.2|
[778c 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 22 3d 13 18 fe bc d8 5f fa 3b 18 |0D. y"=....._.;.|
00000010 2d 68 c1 9b f1 32 3a 55 6b d5 87 1a 78 10 51 54 |-h...2:Uk...x.QT|
00000020 30 9e 78 22 02 20 32 b2 e9 54 07 c5 5b bf 75 e4 |0.x". 2..T..[.u.|
00000030 33 20 c8 7d 5f fa 4c 37 a3 61 c0 30 7d ed 77 b6 |3 .}_.L7.a.0}.w.|
00000040 4a 0f 8d a5 cb a1 |J.....|
[778d 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[778e 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e586a0 gate 1582330578587353100 evaluation starts
[778f 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e586a0 signed by 0 principal evaluation starts (used [false])
[7790 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e586a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7791 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e586a0 principal evaluation succeeds for identity 0
[7792 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e586a0 gate 1582330578587353100 evaluation succeeds
[7793 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7794 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7795 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7796 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7797 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes
[7798 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7799 02-22 00:16:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[779a 02-22 00:16:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 9c 46 05 83 7a 89 5a bf 8f 27 76 92 b5 62 1f |..F..z.Z..'v..b.|
00000010 5f 7e 85 c5 1a 0a f1 57 05 46 c1 45 c1 ad aa e3 |_~.....W.F.E....|
[779b 02-22 00:16:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 27 00 84 66 a9 58 f1 8d e0 51 |0E.!..'..f.X...Q|
00000010 7f 5f 6e d6 18 5e d5 24 3b b2 ca 43 38 2f a7 ea |._n..^.$;..C8/..|
00000020 ad 18 26 1e 4c 02 20 3e 86 d8 5b 15 f7 32 79 ef |..&.L. >..[..2y.|
00000030 f9 b6 6e 0d bc 87 9b 44 b0 d4 bb 40 69 5a 9a bf |..n....D...@iZ..|
00000040 ee e8 87 de 20 1a 9a |.... ..|
[779c 02-22 00:16:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes
[779d 02-22 00:16:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes
[779e 02-22 00:16:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[779f 02-22 00:16:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[77a0 02-22 00:16:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 00 74 ef 7b 90 00 8e e4 eb e8 f2 3f f8 47 22 |..t.{.......?.G"|
00000010 ee e4 92 5f 53 b6 91 70 05 5d 8e 65 aa 65 5d 81 |..._S..p.].e.e].|
[77a1 02-22 00:16:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 65 24 44 29 38 77 d4 b0 fc 4c |0E.!..e$D)8w...L|
00000010 e4 7b 46 3c c1 03 21 62 a0 c7 c1 58 37 b0 22 46 |.{F<..!b...X7."F|
00000020 0c 35 f8 ba cc 02 20 4b 77 f0 49 48 b7 f3 31 43 |.5.... Kw.IH..1C|
00000030 51 40 18 6c ac 74 c8 a7 71 c7 0e 26 43 54 a6 4c |Q@.l.t..q..&CT.L|
00000040 26 17 c5 d5 b7 21 48 |&....!H|
[77a2 02-22 00:16:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes
[77a3 02-22 00:16:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[77a4 02-22 00:16:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[77a5 02-22 00:16:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[77a6 02-22 00:16:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[77a7 02-22 00:16:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[77a8 02-22 00:16:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[77a9 02-22 00:16:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 9c 46 05 83 7a 89 5a bf 8f 27 76 92 b5 62 1f |..F..z.Z..'v..b.|
00000010 5f 7e 85 c5 1a 0a f1 57 05 46 c1 45 c1 ad aa e3 |_~.....W.F.E....|
[77aa 02-22 00:16:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 27 00 84 66 a9 58 f1 8d e0 51 |0E.!..'..f.X...Q|
00000010 7f 5f 6e d6 18 5e d5 24 3b b2 ca 43 38 2f a7 ea |._n..^.$;..C8/..|
00000020 ad 18 26 1e 4c 02 20 3e 86 d8 5b 15 f7 32 79 ef |..&.L. >..[..2y.|
00000030 f9 b6 6e 0d bc 87 9b 44 b0 d4 bb 40 69 5a 9a bf |..n....D...@iZ..|
00000040 ee e8 87 de 20 1a 9a |.... ..|
[77ab 02-22 00:16:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[77ac 02-22 00:16:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 37 69 ff ca f0 5f c6 ac b6 12 |0E.!..7i..._....|
00000010 b1 55 6d 33 dd ce a4 0b e1 f5 d0 cd a8 0c 73 80 |.Um3..........s.|
00000020 e6 e6 89 16 1c 02 20 0b ee 87 1d e4 87 68 28 f7 |...... ......h(.|
00000030 0a 0f 1b 8f c8 7a d4 70 4c b6 7a 8f b9 24 9a bd |.....z.pL.z..$..|
00000040 51 40 bf a7 ee bc 6f |Q@....o|
[77ad 02-22 00:16:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[77ae 02-22 00:16:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:83 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[77af 02-22 00:16:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[77b0 02-22 00:16:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[77b1 02-22 00:16:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:84 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[77b2 02-22 00:16:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[77b3 02-22 00:16:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:84 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[77b4 02-22 00:16:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[77b5 02-22 00:16:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[77b6 02-22 00:16:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[77b7 02-22 00:16:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[77b8 02-22 00:16:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[77b9 02-22 00:16:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[77ba 02-22 00:16:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[77bb 02-22 00:16:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[77bc 02-22 00:16:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 4c 7c 1a fd e1 01 cc 69 fb bf 8e 7a 7a 5f 61 |.L|.....i...zz_a|
00000010 2a 09 a3 e6 87 ff 7a b1 67 8a bd de b1 82 c6 08 |*.....z.g.......|
[77bd 02-22 00:16:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 1b ed 47 7a 80 ae 29 49 1c f4 |0E.!....Gz..)I..|
00000010 59 a1 c6 af eb f4 7d ff a1 4a 8f 42 c3 88 5d 5c |Y.....}..J.B..]\|
00000020 38 54 51 ff b3 02 20 51 4b b1 11 0b 4f 8f 45 91 |8TQ... QK...O.E.|
00000030 d6 69 3b 07 56 23 62 92 ac 8e fb 54 30 79 48 9e |.i;.V#b....T0yH.|
00000040 a6 aa fe 75 e5 af 30 |...u..0|
[77be 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[77bf 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29b40 gate 1582330578650268000 evaluation starts
[77c0 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29b40 signed by 0 principal evaluation starts (used [false])
[77c1 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29b40 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[77c2 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[77c3 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29b40 principal evaluation fails
[77c4 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29b40 gate 1582330578650268000 evaluation fails
[77c5 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[77c6 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[77c7 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[77c8 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 4c 7c 1a fd e1 01 cc 69 fb bf 8e 7a 7a 5f 61 |.L|.....i...zz_a|
00000010 2a 09 a3 e6 87 ff 7a b1 67 8a bd de b1 82 c6 08 |*.....z.g.......|
[77c9 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 1b ed 47 7a 80 ae 29 49 1c f4 |0E.!....Gz..)I..|
00000010 59 a1 c6 af eb f4 7d ff a1 4a 8f 42 c3 88 5d 5c |Y.....}..J.B..]\|
00000020 38 54 51 ff b3 02 20 51 4b b1 11 0b 4f 8f 45 91 |8TQ... QK...O.E.|
00000030 d6 69 3b 07 56 23 62 92 ac 8e fb 54 30 79 48 9e |.i;.V#b....T0yH.|
00000040 a6 aa fe 75 e5 af 30 |...u..0|
[77ca 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[77cb 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e98440 gate 1582330578656987200 evaluation starts
[77cc 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e98440 signed by 0 principal evaluation starts (used [false])
[77cd 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e98440 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[77ce 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e98440 principal evaluation succeeds for identity 0
[77cf 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e98440 gate 1582330578656987200 evaluation succeeds
[77d0 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[77d1 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[77d2 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[77d3 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[77d4 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:84 , Envelope: 83 bytes, Signature: 71 bytes
[77d5 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:84 , Envelope: 83 bytes, Signature: 71 bytes]}
[77d6 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:84
[77d7 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:84
[77d8 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:83 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[77d9 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[77da 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[77db 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[77dc 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[77dd 02-22 00:16:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[77de 02-22 00:16:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[77df 02-22 00:16:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[77e0 02-22 00:16:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[77e1 02-22 00:16:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[77e2 02-22 00:16:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[77e3 02-22 00:16:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[77e4 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:44990
[77e5 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel=businesschannel txID=6782a8b2 mspID=Org2MSP
[77e6 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 00 4b d1 cd a0 ba 7c 32 66 66 de 18 b7 ad 91 |&.K....|2ff.....|
00000010 e4 78 0b 73 38 48 4f ed 69 88 5b 5f 4e 1c 1b 77 |.x.s8HO.i.[_N..w|
[77e7 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 42 da 5f 64 9c cd 0f a6 87 e8 55 |0D. IB._d......U|
00000010 5a b2 5b 97 49 35 bc dd 3d af 4d 45 32 19 b0 cb |Z.[.I5..=.ME2...|
00000020 65 72 80 1b 02 20 29 42 3c f3 dd 0f 15 01 03 6f |er... )B<......o|
00000030 f6 79 c9 83 2b 19 85 1a 4b 75 7c 76 4d 2b 40 db |.y..+...Ku|vM+@.|
00000040 eb 21 cf f2 fa 87 |.!....|
[77e8 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel=businesschannel txID=6782a8b2 mspID=Org2MSP
[77e9 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [6782a8b2e80e71527f1cb31ba0adaace163eee0f89a223cce30beb7b75f81374]
[77ea 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x36, 0x37, 0x38, 0x32, 0x61, 0x38, 0x62, 0x32, 0x65, 0x38, 0x30, 0x65, 0x37, 0x31, 0x35, 0x32, 0x37, 0x66, 0x31, 0x63, 0x62, 0x33, 0x31, 0x62, 0x61, 0x30, 0x61, 0x64, 0x61, 0x61, 0x63, 0x65, 0x31, 0x36, 0x33, 0x65, 0x65, 0x65, 0x30, 0x66, 0x38, 0x39, 0x61, 0x32, 0x32, 0x33, 0x63, 0x63, 0x65, 0x33, 0x30, 0x62, 0x65, 0x62, 0x37, 0x62, 0x37, 0x35, 0x66, 0x38, 0x31, 0x33, 0x37, 0x34}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x36, 0x37, 0x38, 0x32, 0x61, 0x38, 0x62, 0x32, 0x65, 0x38, 0x30, 0x65, 0x37, 0x31, 0x35, 0x32, 0x37, 0x66, 0x31, 0x63, 0x62, 0x33, 0x31, 0x62, 0x61, 0x30, 0x61, 0x64, 0x61, 0x61, 0x63, 0x65, 0x31, 0x36, 0x33, 0x65, 0x65, 0x65, 0x30, 0x66, 0x38, 0x39, 0x61, 0x32, 0x32, 0x33, 0x63, 0x63, 0x65, 0x33, 0x30, 0x62, 0x65, 0x62, 0x37, 0x62, 0x37, 0x35, 0x66, 0x38, 0x31, 0x33, 0x37, 0x34, 0xff}]
[77eb 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose
[77ec 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[77ed 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[77ee 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[77ef 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[77f0 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 00 4b d1 cd a0 ba 7c 32 66 66 de 18 b7 ad 91 |&.K....|2ff.....|
00000010 e4 78 0b 73 38 48 4f ed 69 88 5b 5f 4e 1c 1b 77 |.x.s8HO.i.[_N..w|
[77f1 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 42 da 5f 64 9c cd 0f a6 87 e8 55 |0D. IB._d......U|
00000010 5a b2 5b 97 49 35 bc dd 3d af 4d 45 32 19 b0 cb |Z.[.I5..=.ME2...|
00000020 65 72 80 1b 02 20 29 42 3c f3 dd 0f 15 01 03 6f |er... )B<......o|
00000030 f6 79 c9 83 2b 19 85 1a 4b 75 7c 76 4d 2b 40 db |.y..+...Ku|vM+@.|
00000040 eb 21 cf f2 fa 87 |.!....|
[77f2 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[77f3 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef8600 gate 1582330578938034000 evaluation starts
[77f4 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef8600 signed by 0 principal evaluation starts (used [false])
[77f5 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef8600 processing identity 0 - &{Org2MSP 44c87d6d29f5a901134fda071a7edf7126a7788becd3944cea03a9d24174d773}
[77f6 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef8600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[77f7 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef8600 principal evaluation fails
[77f8 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef8600 gate 1582330578938034000 evaluation fails
[77f9 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers
[77fa 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[77fb 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==
[77fc 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 00 4b d1 cd a0 ba 7c 32 66 66 de 18 b7 ad 91 |&.K....|2ff.....|
00000010 e4 78 0b 73 38 48 4f ed 69 88 5b 5f 4e 1c 1b 77 |.x.s8HO.i.[_N..w|
[77fd 02-22 00:16:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 42 da 5f 64 9c cd 0f a6 87 e8 55 |0D. IB._d......U|
00000010 5a b2 5b 97 49 35 bc dd 3d af 4d 45 32 19 b0 cb |Z.[.I5..=.ME2...|
00000020 65 72 80 1b 02 20 29 42 3c f3 dd 0f 15 01 03 6f |er... )B<......o|
00000030 f6 79 c9 83 2b 19 85 1a 4b 75 7c 76 4d 2b 40 db |.y..+...Ku|vM+@.|
00000040 eb 21 cf f2 fa 87 |.!....|
[77fe 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[77ff 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef8f00 gate 1582330578940428200 evaluation starts
[7800 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef8f00 signed by 0 principal evaluation starts (used [false])
[7801 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef8f00 processing identity 0 - &{Org2MSP 44c87d6d29f5a901134fda071a7edf7126a7788becd3944cea03a9d24174d773}
[7802 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef8f00 principal evaluation succeeds for identity 0
[7803 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef8f00 gate 1582330578940428200 evaluation succeeds
[7804 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers
[7805 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers
[7806 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[7807 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[7808 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[7809 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [6782a8b2e80e71527f1cb31ba0adaace163eee0f89a223cce30beb7b75f81374]
[780a 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[780b 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU [6782a8b2] getting chaincode data for exp02 on channel businesschannel
[780c 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[780d 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[780e 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[780f 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU [6782a8b2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[7810 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU [6782a8b2] handling GET_STATE from chaincode
[7811 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU [6782a8b2] getting state for chaincode exp02, key a, channel businesschannel
[7812 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[7813 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU [6782a8b2] Completed GET_STATE. Sending RESPONSE
[7814 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU [6782a8b2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[7815 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU [6782a8b2] notifying Txid:6782a8b2e80e71527f1cb31ba0adaace163eee0f89a223cce30beb7b75f81374, channelID:businesschannel
[7816 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[7817 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: exp02 duration: 4ms channel=businesschannel txID=6782a8b2
[7818 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[7819 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [6782a8b2e80e71527f1cb31ba0adaace163eee0f89a223cce30beb7b75f81374]
[781a 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU escc for chaincode exp02 is escc channel=businesschannel txID=6782a8b2
[781b 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A200C61373E9AB791487EA86AA088B7...455254494649434154452D2D2D2D2D0A
[781c 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4A5E0ECA43CB9EB0F0A2CC98D91DBA0E4624F651EB280835EA3700AEB911E668
[781d 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [6782a8b2e80e71527f1cb31ba0adaace163eee0f89a223cce30beb7b75f81374]
[781e 02-22 00:16:18.94 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44990 grpc.code=OK grpc.call_duration=14.8891ms
[781f 02-22 00:16:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7820 02-22 00:16:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7821 02-22 00:16:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7822 02-22 00:16:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7823 02-22 00:16:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[7824 02-22 00:16:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[7825 02-22 00:16:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7826 02-22 00:16:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[7828 02-22 00:16:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7827 02-22 00:16:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[7829 02-22 00:16:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[782a 02-22 00:16:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[782b 02-22 00:16:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[782c 02-22 00:16:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330578568381700 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes to 3 peers
[782d 02-22 00:16:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[782f 02-22 00:16:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[782e 02-22 00:16:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330578568381700 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7830 02-22 00:16:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7831 02-22 00:16:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330578568381700 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7832 02-22 00:16:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7833 02-22 00:16:18.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330578568381700 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7834 02-22 00:16:18.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7835 02-22 00:16:18.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 843 bytes, Signature: 0 bytes
[7836 02-22 00:16:18.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7837 02-22 00:16:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[7838 02-22 00:16:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 d8 d1 f9 90 28 ca d4 9c 3a 7b ac ec bf 37 57 |.....(...:{...7W|
00000010 c7 e9 41 8f 19 ac 37 e2 60 b2 5f d4 86 83 d8 89 |..A...7.`._.....|
[7839 02-22 00:16:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 88 d4 6d 1b da 88 e7 7c 30 c4 |0E.!....m....|0.|
00000010 10 5f b5 d9 c3 a5 dd 8c b7 f4 87 e3 20 77 d0 a2 |._.......... w..|
00000020 fc fb 1a 7b 0b 02 20 42 a9 95 58 12 b6 66 86 4f |...{.. B..X..f.O|
00000030 86 af a6 5d de 4c f6 0f d2 aa 18 9c f5 8c b9 8f |...].L..........|
00000040 aa 02 9c 0a f0 6d 7f |.....m.|
[783a 02-22 00:16:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a 02 38 4f a9 ff 0f e2 66 92 0b 49 99 9e 50 8f |J.8O....f..I..P.|
00000010 7b 70 ce 57 1e 9e ba cf 50 e6 e2 9f 94 82 be 39 |{p.W....P......9|
[783b 02-22 00:16:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 8a 59 83 88 e7 d1 b5 af 57 d1 |0E.!...Y......W.|
00000010 40 ff fd 6f 6f 16 ab 3c 8d 31 c2 bc 51 72 4c 69 |@..oo..<.1..QrLi|
00000020 1f 05 05 3a 87 02 20 38 b3 21 f3 0c 5a ed 77 84 |...:.. 8.!..Z.w.|
00000030 d2 80 3b 82 eb 6d 33 9e 42 dc 6d 6d 42 ce a9 6d |..;..m3.B.mmB..m|
00000040 9f 8b 7e 59 b1 d9 a0 |..~Y...|
[783c 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[783d 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[783e 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[783f 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7840 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7841 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7842 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7843 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7844 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 cb 4e cb 14 ba cc 0a 90 99 58 b6 38 bc b5 a7 |..N.......X.8...|
00000010 9c ad a6 fe a4 01 43 6b b1 c3 64 ab 8f ea dd cf |......Ck..d.....|
[7845 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 68 45 fd a3 a5 01 25 32 b7 e5 |0E.!..hE....%2..|
00000010 e1 5f d9 d4 18 4e a4 0f a2 9c a7 4b ef 4e 53 20 |._...N.....K.NS |
00000020 48 82 2e 72 44 02 20 13 0e af cd 37 ac 42 4f 88 |H..rD. ....7.BO.|
00000030 49 76 1c 4b e2 db a6 97 4d 57 ed 17 ac 56 4d b8 |Iv.K....MW...VM.|
00000040 1e 5d 66 93 2b 37 51 |.]f.+7Q|
[7846 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7847 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49190 gate 1582330579016244100 evaluation starts
[7848 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49190 signed by 0 principal evaluation starts (used [false])
[7849 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49190 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[784a 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[784b 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49190 principal evaluation fails
[784c 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49190 gate 1582330579016244100 evaluation fails
[784d 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[784e 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[784f 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7850 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 cb 4e cb 14 ba cc 0a 90 99 58 b6 38 bc b5 a7 |..N.......X.8...|
00000010 9c ad a6 fe a4 01 43 6b b1 c3 64 ab 8f ea dd cf |......Ck..d.....|
[7851 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 68 45 fd a3 a5 01 25 32 b7 e5 |0E.!..hE....%2..|
00000010 e1 5f d9 d4 18 4e a4 0f a2 9c a7 4b ef 4e 53 20 |._...N.....K.NS |
00000020 48 82 2e 72 44 02 20 13 0e af cd 37 ac 42 4f 88 |H..rD. ....7.BO.|
00000030 49 76 1c 4b e2 db a6 97 4d 57 ed 17 ac 56 4d b8 |Iv.K....MW...VM.|
00000040 1e 5d 66 93 2b 37 51 |.]f.+7Q|
[7852 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7853 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49a90 gate 1582330579016668300 evaluation starts
[7854 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49a90 signed by 0 principal evaluation starts (used [false])
[7855 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49a90 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7856 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49a90 principal evaluation succeeds for identity 0
[7857 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49a90 gate 1582330579016668300 evaluation succeeds
[7858 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7859 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[785a 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[785b 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[785c 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[785d 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[785e 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[785f 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7860 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7861 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7862 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7863 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7864 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 8e c8 12 f3 4c 7c 60 31 de e7 09 0e c5 1c e1 |.....L|`1.......|
00000010 da 7a ff 33 7f b4 71 08 ef 00 b0 e2 96 e8 9e 15 |.z.3..q.........|
[7865 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 4b c6 6f 0c cf 58 22 8c e4 a2 |0E.!..K.o..X"...|
00000010 c2 db b7 d4 2b 6e a3 3f 84 0a 33 8b 2c 09 5c eb |....+n.?..3.,.\.|
00000020 e8 67 f3 84 e7 02 20 34 81 2d 7e bb 9b 38 99 d8 |.g.... 4.-~..8..|
00000030 36 b9 82 56 b6 08 e7 0f 85 0b c7 13 74 c5 7c 5f |6..V........t.|_|
00000040 82 38 8b 40 8f c8 47 |.8.@..G|
[7866 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7867 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f69500 gate 1582330579017467700 evaluation starts
[7868 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f69500 signed by 0 principal evaluation starts (used [false])
[7869 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f69500 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[786a 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f69500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[786b 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f69500 principal evaluation fails
[786c 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f69500 gate 1582330579017467700 evaluation fails
[786d 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[786e 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[786f 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7870 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 8e c8 12 f3 4c 7c 60 31 de e7 09 0e c5 1c e1 |.....L|`1.......|
00000010 da 7a ff 33 7f b4 71 08 ef 00 b0 e2 96 e8 9e 15 |.z.3..q.........|
[7871 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 4b c6 6f 0c cf 58 22 8c e4 a2 |0E.!..K.o..X"...|
00000010 c2 db b7 d4 2b 6e a3 3f 84 0a 33 8b 2c 09 5c eb |....+n.?..3.,.\.|
00000020 e8 67 f3 84 e7 02 20 34 81 2d 7e bb 9b 38 99 d8 |.g.... 4.-~..8..|
00000030 36 b9 82 56 b6 08 e7 0f 85 0b c7 13 74 c5 7c 5f |6..V........t.|_|
00000040 82 38 8b 40 8f c8 47 |.8.@..G|
[7872 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7873 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f69e00 gate 1582330579018027700 evaluation starts
[7874 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f69e00 signed by 0 principal evaluation starts (used [false])
[7875 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f69e00 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7876 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f69e00 principal evaluation succeeds for identity 0
[7877 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f69e00 gate 1582330579018027700 evaluation succeeds
[7878 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7879 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[787a 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[787b 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[787c 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[787d 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[787e 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[787f 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7880 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7881 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7882 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 8e c8 12 f3 4c 7c 60 31 de e7 09 0e c5 1c e1 |.....L|`1.......|
00000010 da 7a ff 33 7f b4 71 08 ef 00 b0 e2 96 e8 9e 15 |.z.3..q.........|
[7883 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 4b c6 6f 0c cf 58 22 8c e4 a2 |0E.!..K.o..X"...|
00000010 c2 db b7 d4 2b 6e a3 3f 84 0a 33 8b 2c 09 5c eb |....+n.?..3.,.\.|
00000020 e8 67 f3 84 e7 02 20 34 81 2d 7e bb 9b 38 99 d8 |.g.... 4.-~..8..|
00000030 36 b9 82 56 b6 08 e7 0f 85 0b c7 13 74 c5 7c 5f |6..V........t.|_|
00000040 82 38 8b 40 8f c8 47 |.8.@..G|
[7884 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7885 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f78ba0 gate 1582330579019410800 evaluation starts
[7886 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f78ba0 signed by 0 principal evaluation starts (used [false])
[7887 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f78ba0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7888 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f78ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7889 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f78ba0 principal evaluation fails
[788a 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f78ba0 gate 1582330579019410800 evaluation fails
[788b 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[788c 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[788d 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[788e 02-22 00:16:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 8e c8 12 f3 4c 7c 60 31 de e7 09 0e c5 1c e1 |.....L|`1.......|
00000010 da 7a ff 33 7f b4 71 08 ef 00 b0 e2 96 e8 9e 15 |.z.3..q.........|
[788f 02-22 00:16:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 4b c6 6f 0c cf 58 22 8c e4 a2 |0E.!..K.o..X"...|
00000010 c2 db b7 d4 2b 6e a3 3f 84 0a 33 8b 2c 09 5c eb |....+n.?..3.,.\.|
00000020 e8 67 f3 84 e7 02 20 34 81 2d 7e bb 9b 38 99 d8 |.g.... 4.-~..8..|
00000030 36 b9 82 56 b6 08 e7 0f 85 0b c7 13 74 c5 7c 5f |6..V........t.|_|
00000040 82 38 8b 40 8f c8 47 |.8.@..G|
[7890 02-22 00:16:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7891 02-22 00:16:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f794a0 gate 1582330579020155500 evaluation starts
[7892 02-22 00:16:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f794a0 signed by 0 principal evaluation starts (used [false])
[7893 02-22 00:16:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f794a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7894 02-22 00:16:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f794a0 principal evaluation succeeds for identity 0
[7895 02-22 00:16:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f794a0 gate 1582330579020155500 evaluation succeeds
[7896 02-22 00:16:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7897 02-22 00:16:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7898 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7899 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[789a 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[789b 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[789c 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[789d 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 d8 d1 f9 90 28 ca d4 9c 3a 7b ac ec bf 37 57 |.....(...:{...7W|
00000010 c7 e9 41 8f 19 ac 37 e2 60 b2 5f d4 86 83 d8 89 |..A...7.`._.....|
[789e 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 88 d4 6d 1b da 88 e7 7c 30 c4 |0E.!....m....|0.|
00000010 10 5f b5 d9 c3 a5 dd 8c b7 f4 87 e3 20 77 d0 a2 |._.......... w..|
00000020 fc fb 1a 7b 0b 02 20 42 a9 95 58 12 b6 66 86 4f |...{.. B..X..f.O|
00000030 86 af a6 5d de 4c f6 0f d2 aa 18 9c f5 8c b9 8f |...].L..........|
00000040 aa 02 9c 0a f0 6d 7f |.....m.|
[789f 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a 02 38 4f a9 ff 0f e2 66 92 0b 49 99 9e 50 8f |J.8O....f..I..P.|
00000010 7b 70 ce 57 1e 9e ba cf 50 e6 e2 9f 94 82 be 39 |{p.W....P......9|
[78a0 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 8a 59 83 88 e7 d1 b5 af 57 d1 |0E.!...Y......W.|
00000010 40 ff fd 6f 6f 16 ab 3c 8d 31 c2 bc 51 72 4c 69 |@..oo..<.1..QrLi|
00000020 1f 05 05 3a 87 02 20 38 b3 21 f3 0c 5a ed 77 84 |...:.. 8.!..Z.w.|
00000030 d2 80 3b 82 eb 6d 33 9e 42 dc 6d 6d 42 ce a9 6d |..;..m3.B.mmB..m|
00000040 9f 8b 7e 59 b1 d9 a0 |..~Y...|
[78a1 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78a2 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78a3 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[78a4 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[78a5 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[78a6 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[78a7 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[78a8 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[78a9 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 2b e3 a5 b1 b5 87 d5 e5 bf 9c 61 8e e8 e4 fb |.+.........a....|
00000010 e5 3a 31 da 5f 84 1d 5e 4a b2 a2 6b be 72 11 f0 |.:1._..^J..k.r..|
[78aa 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 81 0e b6 de 1e 19 a5 65 8c 40 |0E.!.........e.@|
00000010 01 41 b4 1c ce a3 30 83 46 24 f0 2c 4b 7c d1 d5 |.A....0.F$.,K|..|
00000020 d8 49 a4 91 56 02 20 45 ca 0c 2b f5 2d 42 1f 5b |.I..V. E..+.-B.[|
00000030 67 01 75 70 a2 a1 05 f1 b9 c4 68 45 a0 83 03 20 |g.up......hE... |
00000040 10 51 a3 44 76 00 96 |.Q.Dv..|
[78ab 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[78ac 02-22 00:16:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f9df40 gate 1582330579059795000 evaluation starts
[78ad 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f9df40 signed by 0 principal evaluation starts (used [false])
[78ae 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f9df40 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[78af 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f9df40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[78b0 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f9df40 principal evaluation fails
[78b1 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f9df40 gate 1582330579059795000 evaluation fails
[78b2 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[78b3 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[78b4 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[78b5 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 2b e3 a5 b1 b5 87 d5 e5 bf 9c 61 8e e8 e4 fb |.+.........a....|
00000010 e5 3a 31 da 5f 84 1d 5e 4a b2 a2 6b be 72 11 f0 |.:1._..^J..k.r..|
[78b6 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 81 0e b6 de 1e 19 a5 65 8c 40 |0E.!.........e.@|
00000010 01 41 b4 1c ce a3 30 83 46 24 f0 2c 4b 7c d1 d5 |.A....0.F$.,K|..|
00000020 d8 49 a4 91 56 02 20 45 ca 0c 2b f5 2d 42 1f 5b |.I..V. E..+.-B.[|
00000030 67 01 75 70 a2 a1 05 f1 b9 c4 68 45 a0 83 03 20 |g.up......hE... |
00000040 10 51 a3 44 76 00 96 |.Q.Dv..|
[78b7 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[78b8 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fb4840 gate 1582330579066621700 evaluation starts
[78b9 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fb4840 signed by 0 principal evaluation starts (used [false])
[78ba 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fb4840 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[78bb 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fb4840 principal evaluation succeeds for identity 0
[78bc 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fb4840 gate 1582330579066621700 evaluation succeeds
[78bd 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[78be 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[78bf 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[78c0 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[78c1 02-22 00:16:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78c2 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78c3 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[78c4 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[78c5 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[78c6 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[78c7 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[78c8 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[78c9 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 32 5c e4 a7 8a 5c 09 e4 a0 3d fa 3e c7 9f 86 |.2\...\...=.>...|
00000010 66 fe 23 5d 7f 26 dc dc c5 e1 85 7a 6c 5f de a9 |f.#].&.....zl_..|
[78ca 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 47 df d8 a0 1f 15 19 d6 4a 50 2d |0D. .G.......JP-|
00000010 0a 52 f5 e9 72 70 24 fb f0 79 48 fb 51 15 bd 77 |.R..rp$..yH.Q..w|
00000020 e9 10 13 64 02 20 2c 57 a5 97 9b 2d 8d 88 49 dc |...d. ,W...-..I.|
00000030 b8 ab 3b 90 b7 da bf 93 6c 23 a5 74 81 d9 11 e2 |..;.....l#.t....|
00000040 d9 11 49 5c fb 35 |..I\.5|
[78cb 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[78cc 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630c2b0 gate 1582330579075142400 evaluation starts
[78cd 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630c2b0 signed by 0 principal evaluation starts (used [false])
[78ce 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630c2b0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[78cf 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630c2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[78d0 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630c2b0 principal evaluation fails
[78d1 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630c2b0 gate 1582330579075142400 evaluation fails
[78d2 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[78d3 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[78d4 02-22 00:16:19.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[78d5 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 32 5c e4 a7 8a 5c 09 e4 a0 3d fa 3e c7 9f 86 |.2\...\...=.>...|
00000010 66 fe 23 5d 7f 26 dc dc c5 e1 85 7a 6c 5f de a9 |f.#].&.....zl_..|
[78d6 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 47 df d8 a0 1f 15 19 d6 4a 50 2d |0D. .G.......JP-|
00000010 0a 52 f5 e9 72 70 24 fb f0 79 48 fb 51 15 bd 77 |.R..rp$..yH.Q..w|
00000020 e9 10 13 64 02 20 2c 57 a5 97 9b 2d 8d 88 49 dc |...d. ,W...-..I.|
00000030 b8 ab 3b 90 b7 da bf 93 6c 23 a5 74 81 d9 11 e2 |..;.....l#.t....|
00000040 d9 11 49 5c fb 35 |..I\.5|
[78d7 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[78d8 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630ccd0 gate 1582330579081319700 evaluation starts
[78d9 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630ccd0 signed by 0 principal evaluation starts (used [false])
[78da 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630ccd0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[78db 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630ccd0 principal evaluation succeeds for identity 0
[78dc 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630ccd0 gate 1582330579081319700 evaluation succeeds
[78dd 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[78de 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[78df 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[78e0 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[78e1 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[78e2 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[78e3 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[78e4 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[78e5 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[78e6 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[78e7 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 32 5c e4 a7 8a 5c 09 e4 a0 3d fa 3e c7 9f 86 |.2\...\...=.>...|
00000010 66 fe 23 5d 7f 26 dc dc c5 e1 85 7a 6c 5f de a9 |f.#].&.....zl_..|
[78e8 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 47 df d8 a0 1f 15 19 d6 4a 50 2d |0D. .G.......JP-|
00000010 0a 52 f5 e9 72 70 24 fb f0 79 48 fb 51 15 bd 77 |.R..rp$..yH.Q..w|
00000020 e9 10 13 64 02 20 2c 57 a5 97 9b 2d 8d 88 49 dc |...d. ,W...-..I.|
00000030 b8 ab 3b 90 b7 da bf 93 6c 23 a5 74 81 d9 11 e2 |..;.....l#.t....|
00000040 d9 11 49 5c fb 35 |..I\.5|
[78e9 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[78ea 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630da70 gate 1582330579087249500 evaluation starts
[78eb 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630da70 signed by 0 principal evaluation starts (used [false])
[78ec 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630da70 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[78ed 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630da70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[78ee 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630da70 principal evaluation fails
[78ef 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00630da70 gate 1582330579087249500 evaluation fails
[78f0 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[78f1 02-22 00:16:19.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[78f2 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[78f3 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 32 5c e4 a7 8a 5c 09 e4 a0 3d fa 3e c7 9f 86 |.2\...\...=.>...|
00000010 66 fe 23 5d 7f 26 dc dc c5 e1 85 7a 6c 5f de a9 |f.#].&.....zl_..|
[78f4 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 47 df d8 a0 1f 15 19 d6 4a 50 2d |0D. .G.......JP-|
00000010 0a 52 f5 e9 72 70 24 fb f0 79 48 fb 51 15 bd 77 |.R..rp$..yH.Q..w|
00000020 e9 10 13 64 02 20 2c 57 a5 97 9b 2d 8d 88 49 dc |...d. ,W...-..I.|
00000030 b8 ab 3b 90 b7 da bf 93 6c 23 a5 74 81 d9 11 e2 |..;.....l#.t....|
00000040 d9 11 49 5c fb 35 |..I\.5|
[78f5 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[78f6 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2370 gate 1582330579091399800 evaluation starts
[78f7 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2370 signed by 0 principal evaluation starts (used [false])
[78f8 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2370 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[78f9 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2370 principal evaluation succeeds for identity 0
[78fa 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0062c2370 gate 1582330579091399800 evaluation succeeds
[78fb 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[78fc 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[78fd 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[78fe 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[78ff 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7900 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[7901 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 d8 d1 f9 90 28 ca d4 9c 3a 7b ac ec bf 37 57 |.....(...:{...7W|
00000010 c7 e9 41 8f 19 ac 37 e2 60 b2 5f d4 86 83 d8 89 |..A...7.`._.....|
[7902 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 88 d4 6d 1b da 88 e7 7c 30 c4 |0E.!....m....|0.|
00000010 10 5f b5 d9 c3 a5 dd 8c b7 f4 87 e3 20 77 d0 a2 |._.......... w..|
00000020 fc fb 1a 7b 0b 02 20 42 a9 95 58 12 b6 66 86 4f |...{.. B..X..f.O|
00000030 86 af a6 5d de 4c f6 0f d2 aa 18 9c f5 8c b9 8f |...].L..........|
00000040 aa 02 9c 0a f0 6d 7f |.....m.|
[7903 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7904 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7905 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7906 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7907 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7908 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7909 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[790a 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[790b 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 cb 4e cb 14 ba cc 0a 90 99 58 b6 38 bc b5 a7 |..N.......X.8...|
00000010 9c ad a6 fe a4 01 43 6b b1 c3 64 ab 8f ea dd cf |......Ck..d.....|
[790c 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 68 45 fd a3 a5 01 25 32 b7 e5 |0E.!..hE....%2..|
00000010 e1 5f d9 d4 18 4e a4 0f a2 9c a7 4b ef 4e 53 20 |._...N.....K.NS |
00000020 48 82 2e 72 44 02 20 13 0e af cd 37 ac 42 4f 88 |H..rD. ....7.BO.|
00000030 49 76 1c 4b e2 db a6 97 4d 57 ed 17 ac 56 4d b8 |Iv.K....MW...VM.|
00000040 1e 5d 66 93 2b 37 51 |.]f.+7Q|
[790d 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[790e 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010bb0 gate 1582330579098313300 evaluation starts
[790f 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010bb0 signed by 0 principal evaluation starts (used [false])
[7910 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010bb0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7911 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7912 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010bb0 principal evaluation fails
[7913 02-22 00:16:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010bb0 gate 1582330579098313300 evaluation fails
[7914 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7915 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7916 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7917 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 cb 4e cb 14 ba cc 0a 90 99 58 b6 38 bc b5 a7 |..N.......X.8...|
00000010 9c ad a6 fe a4 01 43 6b b1 c3 64 ab 8f ea dd cf |......Ck..d.....|
[7918 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 68 45 fd a3 a5 01 25 32 b7 e5 |0E.!..hE....%2..|
00000010 e1 5f d9 d4 18 4e a4 0f a2 9c a7 4b ef 4e 53 20 |._...N.....K.NS |
00000020 48 82 2e 72 44 02 20 13 0e af cd 37 ac 42 4f 88 |H..rD. ....7.BO.|
00000030 49 76 1c 4b e2 db a6 97 4d 57 ed 17 ac 56 4d b8 |Iv.K....MW...VM.|
00000040 1e 5d 66 93 2b 37 51 |.]f.+7Q|
[7919 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[791a 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030114b0 gate 1582330579102357900 evaluation starts
[791b 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030114b0 signed by 0 principal evaluation starts (used [false])
[791c 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030114b0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[791d 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030114b0 principal evaluation succeeds for identity 0
[791e 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030114b0 gate 1582330579102357900 evaluation succeeds
[791f 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7920 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7921 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7922 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7923 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7924 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7925 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7926 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7927 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7928 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7929 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[792a 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[792b 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 2b e3 a5 b1 b5 87 d5 e5 bf 9c 61 8e e8 e4 fb |.+.........a....|
00000010 e5 3a 31 da 5f 84 1d 5e 4a b2 a2 6b be 72 11 f0 |.:1._..^J..k.r..|
[792c 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 81 0e b6 de 1e 19 a5 65 8c 40 |0E.!.........e.@|
00000010 01 41 b4 1c ce a3 30 83 46 24 f0 2c 4b 7c d1 d5 |.A....0.F$.,K|..|
00000020 d8 49 a4 91 56 02 20 45 ca 0c 2b f5 2d 42 1f 5b |.I..V. E..+.-B.[|
00000030 67 01 75 70 a2 a1 05 f1 b9 c4 68 45 a0 83 03 20 |g.up......hE... |
00000040 10 51 a3 44 76 00 96 |.Q.Dv..|
[792d 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[792e 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffd1a0 gate 1582330579107405600 evaluation starts
[792f 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffd1a0 signed by 0 principal evaluation starts (used [false])
[7930 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffd1a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7931 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffd1a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7932 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffd1a0 principal evaluation fails
[7933 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffd1a0 gate 1582330579107405600 evaluation fails
[7934 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7935 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7936 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7937 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 2b e3 a5 b1 b5 87 d5 e5 bf 9c 61 8e e8 e4 fb |.+.........a....|
00000010 e5 3a 31 da 5f 84 1d 5e 4a b2 a2 6b be 72 11 f0 |.:1._..^J..k.r..|
[7938 02-22 00:16:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 81 0e b6 de 1e 19 a5 65 8c 40 |0E.!.........e.@|
00000010 01 41 b4 1c ce a3 30 83 46 24 f0 2c 4b 7c d1 d5 |.A....0.F$.,K|..|
00000020 d8 49 a4 91 56 02 20 45 ca 0c 2b f5 2d 42 1f 5b |.I..V. E..+.-B.[|
00000030 67 01 75 70 a2 a1 05 f1 b9 c4 68 45 a0 83 03 20 |g.up......hE... |
00000040 10 51 a3 44 76 00 96 |.Q.Dv..|
[7939 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[793a 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffdaa0 gate 1582330579110532900 evaluation starts
[793b 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffdaa0 signed by 0 principal evaluation starts (used [false])
[793c 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffdaa0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[793d 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffdaa0 principal evaluation succeeds for identity 0
[793e 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ffdaa0 gate 1582330579110532900 evaluation succeeds
[793f 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7940 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7941 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7942 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7943 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 6e 27 8c c8 b2 3c 2c cc 15 2a 96 98 42 02 7b |"n'...<,..*..B.{|
00000010 73 18 8a 86 61 07 e2 28 52 07 94 a2 3f 16 ee 56 |s...a..(R...?..V|
[7944 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 67 af c6 c6 62 a0 a7 88 b2 9f 7b |0D. sg...b.....{|
00000010 74 3e 02 ee 83 7b f2 09 11 8a 5c eb 61 d7 c6 ce |t>...{....\.a...|
00000020 c4 65 b6 b3 02 20 7c cd b4 c4 0a 24 70 71 65 35 |.e... |....$pqe5|
00000030 58 48 dc 59 53 5b a8 cd ee 61 b1 90 af 41 7b b9 |XH.YS[...a...A{.|
00000040 d1 78 f8 ad ce 6c |.x...l|
[7945 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7946 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7947 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7948 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7949 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[794a 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 6e 27 8c c8 b2 3c 2c cc 15 2a 96 98 42 02 7b |"n'...<,..*..B.{|
00000010 73 18 8a 86 61 07 e2 28 52 07 94 a2 3f 16 ee 56 |s...a..(R...?..V|
[794b 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 67 af c6 c6 62 a0 a7 88 b2 9f 7b |0D. sg...b.....{|
00000010 74 3e 02 ee 83 7b f2 09 11 8a 5c eb 61 d7 c6 ce |t>...{....\.a...|
00000020 c4 65 b6 b3 02 20 7c cd b4 c4 0a 24 70 71 65 35 |.e... |....$pqe5|
00000030 58 48 dc 59 53 5b a8 cd ee 61 b1 90 af 41 7b b9 |XH.YS[...a...A{.|
00000040 d1 78 f8 ad ce 6c |.x...l|
[794c 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[794d 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bccf50 gate 1582330579115255700 evaluation starts
[794e 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bccf50 signed by 0 principal evaluation starts (used [false])
[794f 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bccf50 processing identity 0 - &{Org1MSP 8be655ba89451b517544b2a241617d188129889401e79f0659d7ccb414b44486}
[7950 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bccf50 principal evaluation succeeds for identity 0
[7951 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bccf50 gate 1582330579115255700 evaluation succeeds
[7952 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[7953 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7954 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7955 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7956 02-22 00:16:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7957 02-22 00:16:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7958 02-22 00:16:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7959 02-22 00:16:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[795a 02-22 00:16:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[795b 02-22 00:16:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[795c 02-22 00:16:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14704368342775420940 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[795d 02-22 00:16:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14704368342775420940 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[795e 02-22 00:16:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[795f 02-22 00:16:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 14704368342775420940 , Msg_type: BLOCK_MSG, digests: [7 1 2 3 4 5 6], Envelope: 55 bytes, Signature: 0 bytes
[7960 02-22 00:16:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 14704368342775420940 , Msg_type: BLOCK_MSG, digests: [7 1 2 3 4 5 6], Envelope: 55 bytes, Signature: 0 bytes
[7961 02-22 00:16:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7962 02-22 00:16:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[7963 02-22 00:16:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7964 02-22 00:16:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[7965 02-22 00:16:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[7966 02-22 00:16:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d 51 34 85 cc 97 d9 5d 2e 5c 5a 19 74 18 a7 08 |]Q4....].\Z.t...|
00000010 85 80 f1 21 de 3b 97 12 ee 63 83 e3 d6 b8 86 fe |...!.;...c......|
[7967 02-22 00:16:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 ac fa 1b fc a8 66 83 da df b6 2d |0D. c.....f....-|
00000010 46 9b 50 40 63 fb 27 0a 9b c1 5a 21 7c 3c 0c cf |F.P@c.'...Z!|<..|
00000020 97 91 4e ac 02 20 48 9c 4b b7 41 29 ee 15 f5 f9 |..N.. H.K.A)....|
00000030 4e 79 71 30 5b 12 84 a7 95 4b 9b e8 ac 1f 10 bf |Nyq0[....K......|
00000040 e9 0d 9d 23 f6 3c |...#.<|
[7968 02-22 00:16:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[7969 02-22 00:16:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 0f c2 66 21 3d 14 09 b6 f5 f9 83 |0D. 0..f!=......|
00000010 29 f4 8c 7c c3 4c ea 0d 73 3e d5 5b c0 ca 02 94 |)..|.L..s>.[....|
00000020 13 09 05 c3 02 20 39 45 7f 68 a7 df c2 c5 d3 ab |..... 9E.h......|
00000030 65 b9 75 ca 34 9f e3 e5 62 28 b1 b9 40 79 36 75 |e.u.4...b(..@y6u|
00000040 85 40 b8 15 c2 88 |.@....|
[796a 02-22 00:16:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[796b 02-22 00:16:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[796c 02-22 00:16:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:88
[796d 02-22 00:16:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:88
[796e 02-22 00:16:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[796f 02-22 00:16:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7970 02-22 00:16:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7971 02-22 00:16:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7972 02-22 00:16:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7973 02-22 00:16:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7974 02-22 00:16:19.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7975 02-22 00:16:19.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7976 02-22 00:16:19.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes
[7977 02-22 00:16:19.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7978 02-22 00:16:19.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7979 02-22 00:16:19.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[797a 02-22 00:16:19.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes
[797b 02-22 00:16:19.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[797c 02-22 00:16:19.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes
[797d 02-22 00:16:19.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes
[797e 02-22 00:16:19.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[797f 02-22 00:16:19.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes
[7980 02-22 00:16:19.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7981 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes
[7982 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes
[7983 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7984 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes
[7985 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[7986 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7987 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7988 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7989 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[798a 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[798b 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[798c 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[798d 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e fc 47 c4 f0 06 04 3a 3b df 6a 41 ed 8e a3 cb |~.G....:;.jA....|
00000010 98 32 ed 17 96 87 5c 56 fe 8f 2d 6a 83 6d 4d ec |.2....\V..-j.mM.|
[798e 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d0 b2 56 ee 0e 3c 77 f0 29 ce 39 |0E.!...V..<w.).9|
00000010 5d 71 d6 84 32 24 90 67 bf a7 0c 91 1d a2 b8 5f |]q..2$.g......._|
00000020 25 eb 65 a4 bb 02 20 52 7b 4c 65 93 6e 29 73 de |%.e... R{Le.n)s.|
00000030 84 7e af 67 e8 76 88 bf b7 02 42 e9 9f 52 8c 64 |.~.g.v....B..R.d|
00000040 17 fd be e4 81 ed 67 |......g|
[798f 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7990 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aaf900 gate 1582330579267762900 evaluation starts
[7991 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aaf900 signed by 0 principal evaluation starts (used [false])
[7992 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aaf900 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7993 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aaf900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7994 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aaf900 principal evaluation fails
[7995 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aaf900 gate 1582330579267762900 evaluation fails
[7996 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7997 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7998 02-22 00:16:19.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7999 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e fc 47 c4 f0 06 04 3a 3b df 6a 41 ed 8e a3 cb |~.G....:;.jA....|
00000010 98 32 ed 17 96 87 5c 56 fe 8f 2d 6a 83 6d 4d ec |.2....\V..-j.mM.|
[799a 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d0 b2 56 ee 0e 3c 77 f0 29 ce 39 |0E.!...V..<w.).9|
00000010 5d 71 d6 84 32 24 90 67 bf a7 0c 91 1d a2 b8 5f |]q..2$.g......._|
00000020 25 eb 65 a4 bb 02 20 52 7b 4c 65 93 6e 29 73 de |%.e... R{Le.n)s.|
00000030 84 7e af 67 e8 76 88 bf b7 02 42 e9 9f 52 8c 64 |.~.g.v....B..R.d|
00000040 17 fd be e4 81 ed 67 |......g|
[799b 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[799c 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a32270 gate 1582330579270848600 evaluation starts
[799d 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a32270 signed by 0 principal evaluation starts (used [false])
[799e 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a32270 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[799f 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a32270 principal evaluation succeeds for identity 0
[79a0 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a32270 gate 1582330579270848600 evaluation succeeds
[79a1 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[79a2 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[79a3 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[79a4 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[79a5 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes
[79a6 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes]}
[79a7 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:87
[79a8 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:87
[79a9 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[79aa 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79ab 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79ac 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79ad 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79ae 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79af 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79b0 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79b1 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79b2 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79b3 02-22 00:16:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79b4 02-22 00:16:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[79b5 02-22 00:16:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79b6 02-22 00:16:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[79b7 02-22 00:16:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes
[79b8 02-22 00:16:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79b9 02-22 00:16:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes
[79ba 02-22 00:16:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79bb 02-22 00:16:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes
[79bc 02-22 00:16:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79bd 02-22 00:16:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes
[79be 02-22 00:16:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79bf 02-22 00:16:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes
[79c0 02-22 00:16:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79c1 02-22 00:16:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes
[79c2 02-22 00:16:19.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79c3 02-22 00:16:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes
[79c4 02-22 00:16:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79c5 02-22 00:16:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes
[79c6 02-22 00:16:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79c7 02-22 00:16:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[79c8 02-22 00:16:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[79c9 02-22 00:16:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510201801
[79ca 02-22 00:16:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 158295E4155BB2A3644A4EFF2227ACDAEC1B7E9FD6AC83EC3D345DE52F825AA9
[79cb 02-22 00:16:19.31 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[79cc 02-22 00:16:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79cd 02-22 00:16:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79ce 02-22 00:16:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79cf 02-22 00:16:19.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79d0 02-22 00:16:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:32 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[79d1 02-22 00:16:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79d3 02-22 00:16:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[79d2 02-22 00:16:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:32 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[79d4 02-22 00:16:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[79d5 02-22 00:16:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:44994
[79d6 02-22 00:16:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel=businesschannel txID=5b73472b mspID=Org2MSP
[79d7 02-22 00:16:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 cc 39 fa 37 60 6d aa 1d f2 17 6d 6b ca 8f 55 |..9.7`m....mk..U|
00000010 15 2d 1e 2d 3e 30 84 1a ce 6e 34 66 13 a1 9a b3 |.-.->0...n4f....|
[79d8 02-22 00:16:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 2c e0 4e 1e 39 8e 72 78 55 5b |0E.!..,.N.9.rxU[|
00000010 01 b8 56 d6 19 2a d8 de 11 6d 3b b1 8e 21 4a 7b |..V..*...m;..!J{|
00000020 a4 c1 2c d7 28 02 20 50 a3 ec 9e 81 b6 ed 76 2f |..,.(. P......v/|
00000030 38 e8 c4 dd 4a 7b 1d bb 49 9d 38 0d dd 58 33 f2 |8...J{..I.8..X3.|
00000040 51 f7 11 bd 26 78 71 |Q...&xq|
[79d9 02-22 00:16:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel=businesschannel txID=5b73472b mspID=Org2MSP
[79da 02-22 00:16:19.33 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [5b73472bf0cb9bbbff4e4a7325bf5b5f87663fd3b6b6b6f9756e7fa8b8e54198]
[79db 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x35, 0x62, 0x37, 0x33, 0x34, 0x37, 0x32, 0x62, 0x66, 0x30, 0x63, 0x62, 0x39, 0x62, 0x62, 0x62, 0x66, 0x66, 0x34, 0x65, 0x34, 0x61, 0x37, 0x33, 0x32, 0x35, 0x62, 0x66, 0x35, 0x62, 0x35, 0x66, 0x38, 0x37, 0x36, 0x36, 0x33, 0x66, 0x64, 0x33, 0x62, 0x36, 0x62, 0x36, 0x62, 0x36, 0x66, 0x39, 0x37, 0x35, 0x36, 0x65, 0x37, 0x66, 0x61, 0x38, 0x62, 0x38, 0x65, 0x35, 0x34, 0x31, 0x39, 0x38}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x35, 0x62, 0x37, 0x33, 0x34, 0x37, 0x32, 0x62, 0x66, 0x30, 0x63, 0x62, 0x39, 0x62, 0x62, 0x62, 0x66, 0x66, 0x34, 0x65, 0x34, 0x61, 0x37, 0x33, 0x32, 0x35, 0x62, 0x66, 0x35, 0x62, 0x35, 0x66, 0x38, 0x37, 0x36, 0x36, 0x33, 0x66, 0x64, 0x33, 0x62, 0x36, 0x62, 0x36, 0x62, 0x36, 0x66, 0x39, 0x37, 0x35, 0x36, 0x65, 0x37, 0x66, 0x61, 0x38, 0x62, 0x38, 0x65, 0x35, 0x34, 0x31, 0x39, 0x38, 0xff}]
[79dc 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose
[79dd 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[79de 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[79df 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[79e0 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[79e1 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 cc 39 fa 37 60 6d aa 1d f2 17 6d 6b ca 8f 55 |..9.7`m....mk..U|
00000010 15 2d 1e 2d 3e 30 84 1a ce 6e 34 66 13 a1 9a b3 |.-.->0...n4f....|
[79e2 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 2c e0 4e 1e 39 8e 72 78 55 5b |0E.!..,.N.9.rxU[|
00000010 01 b8 56 d6 19 2a d8 de 11 6d 3b b1 8e 21 4a 7b |..V..*...m;..!J{|
00000020 a4 c1 2c d7 28 02 20 50 a3 ec 9e 81 b6 ed 76 2f |..,.(. P......v/|
00000030 38 e8 c4 dd 4a 7b 1d bb 49 9d 38 0d dd 58 33 f2 |8...J{..I.8..X3.|
00000040 51 f7 11 bd 26 78 71 |Q...&xq|
[79e3 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[79e4 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a068e0 gate 1582330579344551900 evaluation starts
[79e5 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a068e0 signed by 0 principal evaluation starts (used [false])
[79e6 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a068e0 processing identity 0 - &{Org2MSP 44c87d6d29f5a901134fda071a7edf7126a7788becd3944cea03a9d24174d773}
[79e7 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a068e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[79e8 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a068e0 principal evaluation fails
[79e9 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a068e0 gate 1582330579344551900 evaluation fails
[79ea 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers
[79eb 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[79ec 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==
[79ed 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 cc 39 fa 37 60 6d aa 1d f2 17 6d 6b ca 8f 55 |..9.7`m....mk..U|
00000010 15 2d 1e 2d 3e 30 84 1a ce 6e 34 66 13 a1 9a b3 |.-.->0...n4f....|
[79ee 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 2c e0 4e 1e 39 8e 72 78 55 5b |0E.!..,.N.9.rxU[|
00000010 01 b8 56 d6 19 2a d8 de 11 6d 3b b1 8e 21 4a 7b |..V..*...m;..!J{|
00000020 a4 c1 2c d7 28 02 20 50 a3 ec 9e 81 b6 ed 76 2f |..,.(. P......v/|
00000030 38 e8 c4 dd 4a 7b 1d bb 49 9d 38 0d dd 58 33 f2 |8...J{..I.8..X3.|
00000040 51 f7 11 bd 26 78 71 |Q...&xq|
[79ef 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[79f0 02-22 00:16:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a071e0 gate 1582330579349832100 evaluation starts
[79f1 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a071e0 signed by 0 principal evaluation starts (used [false])
[79f2 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a071e0 processing identity 0 - &{Org2MSP 44c87d6d29f5a901134fda071a7edf7126a7788becd3944cea03a9d24174d773}
[79f3 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a071e0 principal evaluation succeeds for identity 0
[79f4 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a071e0 gate 1582330579349832100 evaluation succeeds
[79f5 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers
[79f6 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers
[79f7 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[79f8 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[79f9 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[79fa 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [5b73472bf0cb9bbbff4e4a7325bf5b5f87663fd3b6b6b6f9756e7fa8b8e54198]
[79fb 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[79fc 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU [5b73472b] getting chaincode data for exp02 on channel businesschannel
[79fd 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[79fe 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[79ff 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[7a00 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU [5b73472b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[7a01 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU [5b73472b] handling GET_STATE from chaincode
[7a02 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU [5b73472b] getting state for chaincode exp02, key a, channel businesschannel
[7a03 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[7a04 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU [5b73472b] Completed GET_STATE. Sending RESPONSE
[7a05 02-22 00:16:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU [5b73472b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[7a06 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU [5b73472b] handling GET_STATE from chaincode
[7a07 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU [5b73472b] getting state for chaincode exp02, key b, channel businesschannel
[7a08 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b
[7a09 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU [5b73472b] Completed GET_STATE. Sending RESPONSE
[7a0a 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU [5b73472b] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[7a0b 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU [5b73472b] handling PUT_STATE from chaincode
[7a0c 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU [5b73472b] Completed PUT_STATE. Sending RESPONSE
[7a0d 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU [5b73472b] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready
[7a0e 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU [5b73472b] handling PUT_STATE from chaincode
[7a0f 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU [5b73472b] Completed PUT_STATE. Sending RESPONSE
[7a10 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU [5b73472b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[7a11 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU [5b73472b] notifying Txid:5b73472bf0cb9bbbff4e4a7325bf5b5f87663fd3b6b6b6f9756e7fa8b8e54198, channelID:businesschannel
[7a12 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[7a13 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: exp02 duration: 10ms channel=businesschannel txID=5b73472b
[7a14 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[7a15 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5b73472bf0cb9bbbff4e4a7325bf5b5f87663fd3b6b6b6f9756e7fa8b8e54198]
[7a16 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU escc for chaincode exp02 is escc channel=businesschannel txID=5b73472b
[7a17 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20F3E2D23A566A9CC3547EA0C50D8C...455254494649434154452D2D2D2D2D0A
[7a18 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4A98C15B6DD16E76A5AF839F6BE4C94781F15EE3CB4C47453D2ADAFA7D1D32FE
[7a19 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5b73472bf0cb9bbbff4e4a7325bf5b5f87663fd3b6b6b6f9756e7fa8b8e54198]
[7a1a 02-22 00:16:19.36 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44994 grpc.code=OK grpc.call_duration=29.6517ms
[7a1b 02-22 00:16:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7a1c 02-22 00:16:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7a1d 02-22 00:16:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[7a1e 02-22 00:16:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a1f 02-22 00:16:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a20 02-22 00:16:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7a21 02-22 00:16:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330578616657200 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[7a22 02-22 00:16:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 6e 27 8c c8 b2 3c 2c cc 15 2a 96 98 42 02 7b |"n'...<,..*..B.{|
00000010 73 18 8a 86 61 07 e2 28 52 07 94 a2 3f 16 ee 56 |s...a..(R...?..V|
[7a23 02-22 00:16:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 67 af c6 c6 62 a0 a7 88 b2 9f 7b |0D. sg...b.....{|
00000010 74 3e 02 ee 83 7b f2 09 11 8a 5c eb 61 d7 c6 ce |t>...{....\.a...|
00000020 c4 65 b6 b3 02 20 7c cd b4 c4 0a 24 70 71 65 35 |.e... |....$pqe5|
00000030 58 48 dc 59 53 5b a8 cd ee 61 b1 90 af 41 7b b9 |XH.YS[...a...A{.|
00000040 d1 78 f8 ad ce 6c |.x...l|
[7a24 02-22 00:16:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7a25 02-22 00:16:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330578616657200 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[7a26 02-22 00:16:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 6e 27 8c c8 b2 3c 2c cc 15 2a 96 98 42 02 7b |"n'...<,..*..B.{|
00000010 73 18 8a 86 61 07 e2 28 52 07 94 a2 3f 16 ee 56 |s...a..(R...?..V|
[7a27 02-22 00:16:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 67 af c6 c6 62 a0 a7 88 b2 9f 7b |0D. sg...b.....{|
00000010 74 3e 02 ee 83 7b f2 09 11 8a 5c eb 61 d7 c6 ce |t>...{....\.a...|
00000020 c4 65 b6 b3 02 20 7c cd b4 c4 0a 24 70 71 65 35 |.e... |....$pqe5|
00000030 58 48 dc 59 53 5b a8 cd ee 61 b1 90 af 41 7b b9 |XH.YS[...a...A{.|
00000040 d1 78 f8 ad ce 6c |.x...l|
[7a28 02-22 00:16:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a29 02-22 00:16:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7a2a 02-22 00:16:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330578616657200 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[7a2b 02-22 00:16:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330578616657200 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[7a2c 02-22 00:16:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 6e 27 8c c8 b2 3c 2c cc 15 2a 96 98 42 02 7b |"n'...<,..*..B.{|
00000010 73 18 8a 86 61 07 e2 28 52 07 94 a2 3f 16 ee 56 |s...a..(R...?..V|
[7a2d 02-22 00:16:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 67 af c6 c6 62 a0 a7 88 b2 9f 7b |0D. sg...b.....{|
00000010 74 3e 02 ee 83 7b f2 09 11 8a 5c eb 61 d7 c6 ce |t>...{....\.a...|
00000020 c4 65 b6 b3 02 20 7c cd b4 c4 0a 24 70 71 65 35 |.e... |....$pqe5|
00000030 58 48 dc 59 53 5b a8 cd ee 61 b1 90 af 41 7b b9 |XH.YS[...a...A{.|
00000040 d1 78 f8 ad ce 6c |.x...l|
[7a2e 02-22 00:16:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a2f 02-22 00:16:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7a30 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:45000
[7a31 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel=businesschannel txID=f3c58bdb mspID=Org1MSP
[7a32 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 c2 d2 41 3a e2 5d c7 ac 12 f6 a3 c1 bc 3e 11 |...A:.].......>.|
00000010 05 e6 5a 36 a3 a9 c4 7a 0c f3 50 ff 8e 02 3c 70 |..Z6...z..P...<p|
[7a33 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 85 7f 2d f3 17 8c 52 a2 da 54 cc |0D. m..-...R..T.|
00000010 c3 a0 8c c6 de 6c a1 ba 97 8b 21 3d f9 1b 52 7e |.....l....!=..R~|
00000020 bd 4f 7a 6a 02 20 69 7d 2d 40 fd 9e 9b cb a7 05 |.Ozj. i}-@......|
00000030 f3 f4 c0 6f de 33 67 b9 78 eb a8 7f 76 46 2e 6a |...o.3g.x...vF.j|
00000040 d7 af e0 a6 82 2d |.....-|
[7a34 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel=businesschannel txID=f3c58bdb mspID=Org1MSP
[7a35 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [f3c58bdbb7d96640cb6f60ddffdde95538e1cacb55982dd028d3d2b2c17953ba]
[7a36 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x66, 0x33, 0x63, 0x35, 0x38, 0x62, 0x64, 0x62, 0x62, 0x37, 0x64, 0x39, 0x36, 0x36, 0x34, 0x30, 0x63, 0x62, 0x36, 0x66, 0x36, 0x30, 0x64, 0x64, 0x66, 0x66, 0x64, 0x64, 0x65, 0x39, 0x35, 0x35, 0x33, 0x38, 0x65, 0x31, 0x63, 0x61, 0x63, 0x62, 0x35, 0x35, 0x39, 0x38, 0x32, 0x64, 0x64, 0x30, 0x32, 0x38, 0x64, 0x33, 0x64, 0x32, 0x62, 0x32, 0x63, 0x31, 0x37, 0x39, 0x35, 0x33, 0x62, 0x61}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x66, 0x33, 0x63, 0x35, 0x38, 0x62, 0x64, 0x62, 0x62, 0x37, 0x64, 0x39, 0x36, 0x36, 0x34, 0x30, 0x63, 0x62, 0x36, 0x66, 0x36, 0x30, 0x64, 0x64, 0x66, 0x66, 0x64, 0x64, 0x65, 0x39, 0x35, 0x35, 0x33, 0x38, 0x65, 0x31, 0x63, 0x61, 0x63, 0x62, 0x35, 0x35, 0x39, 0x38, 0x32, 0x64, 0x64, 0x30, 0x32, 0x38, 0x64, 0x33, 0x64, 0x32, 0x62, 0x32, 0x63, 0x31, 0x37, 0x39, 0x35, 0x33, 0x62, 0x61, 0xff}]
[7a37 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose
[7a38 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[7a39 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[7a3a 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7a3b 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[7a3c 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 c2 d2 41 3a e2 5d c7 ac 12 f6 a3 c1 bc 3e 11 |...A:.].......>.|
00000010 05 e6 5a 36 a3 a9 c4 7a 0c f3 50 ff 8e 02 3c 70 |..Z6...z..P...<p|
[7a3d 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 85 7f 2d f3 17 8c 52 a2 da 54 cc |0D. m..-...R..T.|
00000010 c3 a0 8c c6 de 6c a1 ba 97 8b 21 3d f9 1b 52 7e |.....l....!=..R~|
00000020 bd 4f 7a 6a 02 20 69 7d 2d 40 fd 9e 9b cb a7 05 |.Ozj. i}-@......|
00000030 f3 f4 c0 6f de 33 67 b9 78 eb a8 7f 76 46 2e 6a |...o.3g.x...vF.j|
00000040 d7 af e0 a6 82 2d |.....-|
[7a3e 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7a3f 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c2c60 gate 1582330579684683600 evaluation starts
[7a40 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c2c60 signed by 0 principal evaluation starts (used [false])
[7a41 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c2c60 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[7a42 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c2c60 principal evaluation succeeds for identity 0
[7a43 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c2c60 gate 1582330579684683600 evaluation succeeds
[7a44 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers
[7a45 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[7a46 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[7a47 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[7a48 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[7a49 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [f3c58bdbb7d96640cb6f60ddffdde95538e1cacb55982dd028d3d2b2c17953ba]
[7a4a 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[7a4b 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU [f3c58bdb] getting chaincode data for exp02 on channel businesschannel
[7a4c 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[7a4d 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[7a4e 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[7a4f 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU [f3c58bdb] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[7a50 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU [f3c58bdb] handling GET_STATE from chaincode
[7a51 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU [f3c58bdb] getting state for chaincode exp02, key a, channel businesschannel
[7a52 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[7a53 02-22 00:16:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU [f3c58bdb] Completed GET_STATE. Sending RESPONSE
[7a54 02-22 00:16:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU [f3c58bdb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[7a55 02-22 00:16:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU [f3c58bdb] notifying Txid:f3c58bdbb7d96640cb6f60ddffdde95538e1cacb55982dd028d3d2b2c17953ba, channelID:businesschannel
[7a56 02-22 00:16:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[7a57 02-22 00:16:19.69 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: exp02 duration: 5ms channel=businesschannel txID=f3c58bdb
[7a58 02-22 00:16:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[7a59 02-22 00:16:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f3c58bdbb7d96640cb6f60ddffdde95538e1cacb55982dd028d3d2b2c17953ba]
[7a5a 02-22 00:16:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU escc for chaincode exp02 is escc channel=businesschannel txID=f3c58bdb
[7a5b 02-22 00:16:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20F446789319EB780FAC1C3977CC7A...455254494649434154452D2D2D2D2D0A
[7a5c 02-22 00:16:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3408E06F2345CE4AB651A9BBCB1AB86F17B795656ECDFC1EF6D9016E7163DBF2
[7a5d 02-22 00:16:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f3c58bdbb7d96640cb6f60ddffdde95538e1cacb55982dd028d3d2b2c17953ba]
[7a5e 02-22 00:16:19.69 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45000 grpc.code=OK grpc.call_duration=11.5998ms
[7a5f 02-22 00:16:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7a60 02-22 00:16:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:45000: read: connection reset by peer
[7a61 02-22 00:16:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7a62 02-22 00:16:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151054
[7a63 02-22 00:16:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C4A4E3F5DD3177BE021822C339ABD8D68381096F7A0C48DED4864B0B1123C68A
[7a64 02-22 00:16:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[7a65 02-22 00:16:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[7a66 02-22 00:16:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[7a67 02-22 00:16:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a68 02-22 00:16:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a69 02-22 00:16:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a6a 02-22 00:16:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7a6b 02-22 00:16:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[7a6c 02-22 00:16:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7a6d 02-22 00:16:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7a6e 02-22 00:16:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7a6f 02-22 00:16:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7a70 02-22 00:16:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a71 02-22 00:16:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[7a72 02-22 00:16:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7a73 02-22 00:16:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7a74 02-22 00:16:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7a75 02-22 00:16:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7a76 02-22 00:16:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7a77 02-22 00:16:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7a78 02-22 00:16:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[7a79 02-22 00:16:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 a4 e3 f5 dd 31 77 be 02 18 22 c3 39 ab d8 d6 |.....1w...".9...|
00000010 83 81 09 6f 7a 0c 48 de d4 86 4b 0b 11 23 c6 8a |...oz.H...K..#..|
[7a7a 02-22 00:16:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 21 00 d5 49 61 ca ab d1 83 90 e8 eb f8 |0D.!..Ia........|
00000010 5c 83 d8 ff 93 0c f9 26 f9 29 1a b2 35 f4 db eb |\......&.)..5...|
00000020 b5 ec c5 01 6c 02 1f 48 a5 04 9a 95 73 2a f4 78 |....l..H....s*.x|
00000030 dd 26 7b cd 0c 04 26 27 3b 55 6e 60 e3 a9 be 4a |.&{...&';Un`...J|
00000040 5a d3 55 13 16 fd |Z.U...|
[7a7b 02-22 00:16:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:84 , Envelope: 83 bytes, Signature: 70 bytes
[7a7c 02-22 00:16:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7a7d 02-22 00:16:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12361075555951535897 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[7a7e 02-22 00:16:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12361075555951535897 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[7a7f 02-22 00:16:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6 7] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[7a80 02-22 00:16:19.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7a81 02-22 00:16:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[7a82 02-22 00:16:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a83 02-22 00:16:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a84 02-22 00:16:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a85 02-22 00:16:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7a86 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330578609221300 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7a87 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7a88 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7a89 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7a8a 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7a8b 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7a8c 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7a8d 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7a8e 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 8e c8 12 f3 4c 7c 60 31 de e7 09 0e c5 1c e1 |.....L|`1.......|
00000010 da 7a ff 33 7f b4 71 08 ef 00 b0 e2 96 e8 9e 15 |.z.3..q.........|
[7a8f 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 4b c6 6f 0c cf 58 22 8c e4 a2 |0E.!..K.o..X"...|
00000010 c2 db b7 d4 2b 6e a3 3f 84 0a 33 8b 2c 09 5c eb |....+n.?..3.,.\.|
00000020 e8 67 f3 84 e7 02 20 34 81 2d 7e bb 9b 38 99 d8 |.g.... 4.-~..8..|
00000030 36 b9 82 56 b6 08 e7 0f 85 0b c7 13 74 c5 7c 5f |6..V........t.|_|
00000040 82 38 8b 40 8f c8 47 |.8.@..G|
[7a90 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7a91 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00016d9b0 gate 1582330579914975200 evaluation starts
[7a92 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00016d9b0 signed by 0 principal evaluation starts (used [false])
[7a93 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00016d9b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7a94 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00016d9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7a95 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00016d9b0 principal evaluation fails
[7a96 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00016d9b0 gate 1582330579914975200 evaluation fails
[7a97 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7a98 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7a99 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7a9a 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 8e c8 12 f3 4c 7c 60 31 de e7 09 0e c5 1c e1 |.....L|`1.......|
00000010 da 7a ff 33 7f b4 71 08 ef 00 b0 e2 96 e8 9e 15 |.z.3..q.........|
[7a9b 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 4b c6 6f 0c cf 58 22 8c e4 a2 |0E.!..K.o..X"...|
00000010 c2 db b7 d4 2b 6e a3 3f 84 0a 33 8b 2c 09 5c eb |....+n.?..3.,.\.|
00000020 e8 67 f3 84 e7 02 20 34 81 2d 7e bb 9b 38 99 d8 |.g.... 4.-~..8..|
00000030 36 b9 82 56 b6 08 e7 0f 85 0b c7 13 74 c5 7c 5f |6..V........t.|_|
00000040 82 38 8b 40 8f c8 47 |.8.@..G|
[7a9c 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7a9d 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000210700 gate 1582330579916773400 evaluation starts
[7a9e 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000210700 signed by 0 principal evaluation starts (used [false])
[7a9f 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000210700 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7aa0 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000210700 principal evaluation succeeds for identity 0
[7aa1 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000210700 gate 1582330579916773400 evaluation succeeds
[7aa2 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7aa3 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7aa4 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7aa5 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7aa6 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7aa7 02-22 00:16:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7aa8 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330578609221300 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7aa9 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330578609221300 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7aaa 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7aab 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7aac 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7aad 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7aae 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7aaf 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7ab0 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7ab1 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 8e c8 12 f3 4c 7c 60 31 de e7 09 0e c5 1c e1 |.....L|`1.......|
00000010 da 7a ff 33 7f b4 71 08 ef 00 b0 e2 96 e8 9e 15 |.z.3..q.........|
[7ab2 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 4b c6 6f 0c cf 58 22 8c e4 a2 |0E.!..K.o..X"...|
00000010 c2 db b7 d4 2b 6e a3 3f 84 0a 33 8b 2c 09 5c eb |....+n.?..3.,.\.|
00000020 e8 67 f3 84 e7 02 20 34 81 2d 7e bb 9b 38 99 d8 |.g.... 4.-~..8..|
00000030 36 b9 82 56 b6 08 e7 0f 85 0b c7 13 74 c5 7c 5f |6..V........t.|_|
00000040 82 38 8b 40 8f c8 47 |.8.@..G|
[7ab3 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7ab4 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230480 gate 1582330579947315100 evaluation starts
[7ab5 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230480 signed by 0 principal evaluation starts (used [false])
[7ab6 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230480 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7ab7 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7ab8 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230480 principal evaluation fails
[7ab9 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230480 gate 1582330579947315100 evaluation fails
[7aba 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7abb 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7abc 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7abd 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 8e c8 12 f3 4c 7c 60 31 de e7 09 0e c5 1c e1 |.....L|`1.......|
00000010 da 7a ff 33 7f b4 71 08 ef 00 b0 e2 96 e8 9e 15 |.z.3..q.........|
[7abe 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 4b c6 6f 0c cf 58 22 8c e4 a2 |0E.!..K.o..X"...|
00000010 c2 db b7 d4 2b 6e a3 3f 84 0a 33 8b 2c 09 5c eb |....+n.?..3.,.\.|
00000020 e8 67 f3 84 e7 02 20 34 81 2d 7e bb 9b 38 99 d8 |.g.... 4.-~..8..|
00000030 36 b9 82 56 b6 08 e7 0f 85 0b c7 13 74 c5 7c 5f |6..V........t.|_|
00000040 82 38 8b 40 8f c8 47 |.8.@..G|
[7abf 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7ac0 02-22 00:16:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230db0 gate 1582330579949614400 evaluation starts
[7ac1 02-22 00:16:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230db0 signed by 0 principal evaluation starts (used [false])
[7ac2 02-22 00:16:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230db0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7ac3 02-22 00:16:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230db0 principal evaluation succeeds for identity 0
[7ac4 02-22 00:16:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000230db0 gate 1582330579949614400 evaluation succeeds
[7ac5 02-22 00:16:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7ac6 02-22 00:16:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7ac7 02-22 00:16:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7ac8 02-22 00:16:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7ac9 02-22 00:16:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7aca 02-22 00:16:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7acb 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7acc 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7acd 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7ace 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[7acf 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ad0 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7ad1 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7ad2 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7ad3 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7ad4 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7ad5 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7ad6 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f e4 cf f6 8f 45 81 68 fb af af c5 79 b1 4e 0e |O....E.h....y.N.|
00000010 2e bd 6b 7b 30 ba eb b2 b9 85 a8 7e db ce f5 63 |..k{0......~...c|
[7ad7 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 cc 8d 8d ed 13 25 02 94 57 79 |0E.!.......%..Wy|
00000010 51 f0 37 a4 5f 68 5d 1a 08 c3 fc 89 0c fa bd 33 |Q.7._h]........3|
00000020 2c a4 8c 14 48 02 20 10 cd 80 9e 72 13 49 65 0b |,...H. ....r.Ie.|
00000030 35 dd ef a2 0a 44 bb 91 81 36 d3 2c e0 a8 c2 7b |5....D...6.,...{|
00000040 ae 8f cd ea 28 93 7d |....(.}|
[7ad8 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7ad9 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000253130 gate 1582330580163869900 evaluation starts
[7ada 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000253130 signed by 0 principal evaluation starts (used [false])
[7adb 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000253130 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7adc 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000253130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7add 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000253130 principal evaluation fails
[7ade 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000253130 gate 1582330580163869900 evaluation fails
[7adf 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7ae0 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7ae1 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7ae2 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f e4 cf f6 8f 45 81 68 fb af af c5 79 b1 4e 0e |O....E.h....y.N.|
00000010 2e bd 6b 7b 30 ba eb b2 b9 85 a8 7e db ce f5 63 |..k{0......~...c|
[7ae3 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 cc 8d 8d ed 13 25 02 94 57 79 |0E.!.......%..Wy|
00000010 51 f0 37 a4 5f 68 5d 1a 08 c3 fc 89 0c fa bd 33 |Q.7._h]........3|
00000020 2c a4 8c 14 48 02 20 10 cd 80 9e 72 13 49 65 0b |,...H. ....r.Ie.|
00000030 35 dd ef a2 0a 44 bb 91 81 36 d3 2c e0 a8 c2 7b |5....D...6.,...{|
00000040 ae 8f cd ea 28 93 7d |....(.}|
[7ae4 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7ae5 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7ae6 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7ae7 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000253a40 gate 1582330580168737100 evaluation starts
[7ae8 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000253a40 signed by 0 principal evaluation starts (used [false])
[7ae9 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000253a40 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7aea 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000253a40 principal evaluation succeeds for identity 0
[7aeb 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000253a40 gate 1582330580168737100 evaluation succeeds
[7aec 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7aed 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7aee 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7aef 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7af0 02-22 00:16:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7af1 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes]}
[7af2 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:85
[7af3 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:85
[7af4 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:84 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[7af5 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7af6 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7af7 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7af8 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7af9 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7afa 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7afb 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[7afc 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[7afd 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7afe 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7aff 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b00 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b01 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b02 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b03 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b04 02-22 00:16:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b05 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b06 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b07 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b08 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[7b09 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b0a 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[7b0b 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7b0c 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b0d 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7b0e 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b0f 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424343087800 seq_num:1582330578583148000 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[7b10 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424343087800 seq_num:1582330578583148000 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7 properties:ledger_height:8 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[7b11 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b12 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7b13 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7b14 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7b15 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7b16 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7b17 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7b18 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 32 5c e4 a7 8a 5c 09 e4 a0 3d fa 3e c7 9f 86 |.2\...\...=.>...|
00000010 66 fe 23 5d 7f 26 dc dc c5 e1 85 7a 6c 5f de a9 |f.#].&.....zl_..|
[7b19 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 47 df d8 a0 1f 15 19 d6 4a 50 2d |0D. .G.......JP-|
00000010 0a 52 f5 e9 72 70 24 fb f0 79 48 fb 51 15 bd 77 |.R..rp$..yH.Q..w|
00000020 e9 10 13 64 02 20 2c 57 a5 97 9b 2d 8d 88 49 dc |...d. ,W...-..I.|
00000030 b8 ab 3b 90 b7 da bf 93 6c 23 a5 74 81 d9 11 e2 |..;.....l#.t....|
00000040 d9 11 49 5c fb 35 |..I\.5|
[7b1a 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7b1b 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031b030 gate 1582330580188954900 evaluation starts
[7b1c 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031b030 signed by 0 principal evaluation starts (used [false])
[7b1d 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031b030 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7b1e 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031b030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7b1f 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031b030 principal evaluation fails
[7b20 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031b030 gate 1582330580188954900 evaluation fails
[7b21 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7b22 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7b23 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7b24 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 32 5c e4 a7 8a 5c 09 e4 a0 3d fa 3e c7 9f 86 |.2\...\...=.>...|
00000010 66 fe 23 5d 7f 26 dc dc c5 e1 85 7a 6c 5f de a9 |f.#].&.....zl_..|
[7b25 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 47 df d8 a0 1f 15 19 d6 4a 50 2d |0D. .G.......JP-|
00000010 0a 52 f5 e9 72 70 24 fb f0 79 48 fb 51 15 bd 77 |.R..rp$..yH.Q..w|
00000020 e9 10 13 64 02 20 2c 57 a5 97 9b 2d 8d 88 49 dc |...d. ,W...-..I.|
00000030 b8 ab 3b 90 b7 da bf 93 6c 23 a5 74 81 d9 11 e2 |..;.....l#.t....|
00000040 d9 11 49 5c fb 35 |..I\.5|
[7b26 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7b27 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031b990 gate 1582330580189364000 evaluation starts
[7b28 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031b990 signed by 0 principal evaluation starts (used [false])
[7b29 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031b990 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7b2a 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031b990 principal evaluation succeeds for identity 0
[7b2b 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031b990 gate 1582330580189364000 evaluation succeeds
[7b2c 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7b2d 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7b2e 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7b2f 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7b30 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b31 02-22 00:16:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b32 02-22 00:16:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7b33 02-22 00:16:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b34 02-22 00:16:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7b35 02-22 00:16:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b36 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7b37 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[7b38 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[7b39 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7b3a 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[7b3b 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 a1 05 12 e1 05 b7 41 dd ec 5c 01 e7 d7 16 38 |.......A..\....8|
00000010 47 0f 55 ec c8 26 b6 98 3f d0 ab e8 a2 98 db 15 |G.U..&..?.......|
[7b3c 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be d5 de 41 b4 90 c5 7c f9 e9 5d |0E.!....A...|..]|
00000010 81 b0 5e 05 67 ae 50 23 0b 6a bd e9 70 48 b4 eb |..^.g.P#.j..pH..|
00000020 7d f7 56 3a 2b 02 20 62 30 fb 73 42 58 8a 35 7a |}.V:+. b0.sBX.5z|
00000030 74 8d 37 f0 09 e5 08 44 e7 d4 b2 b1 06 3b 3d 6b |t.7....D.....;=k|
00000040 ce 3a d3 80 3e b3 c8 |.:..>..|
[7b3d 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7b3e 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344e20 gate 1582330581461855400 evaluation starts
[7b3f 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344e20 signed by 0 principal evaluation starts (used [false])
[7b40 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344e20 processing identity 0 - &{OrdererMSP 9de2412befbda85787d990eb15cf69142545cfd8abf27ca5a151a46e885ec6cd}
[7b41 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344e20 principal evaluation succeeds for identity 0
[7b42 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000344e20 gate 1582330581461855400 evaluation succeeds
[7b43 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[7b44 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[7b45 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[7b46 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[7b47 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [8] channel=businesschannel
[7b48 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [8]
[7b49 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks
[7b4a 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [8] channel=businesschannel
[7b4b 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4045 bytes, seq: 8}, Envelope: 4075 bytes, Signature: 0 bytes to the block puller
[7b4c 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Added 8, total items: 8
[7b4d 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [8]
[7b4e 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [8] with 1 transaction(s) to the ledger
[7b4f 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [8] from buffer
[7b50 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [8]
[7b51 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [8]
[7b52 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[7b53 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc005343bc0 env 0xc002bc2550 txn 0
[7b54 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002bc2550
[7b55 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\323\345\301\362\005\020\334\327\352\237\001\"\017businesschannel*@5b73472bf0cb9bbbff4e4a7325bf5b5f87663fd3b6b6b6f9756e7fa8b8e54198:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\npnWuUMQ+CNf2XrYWYElLritc4lD3dQVBqCL4zeo=\n-----END CERTIFICATE-----\n\022\030\020T)\024\001\272\2532\266\372\314{)X\232\277\310\002\335\010\3531\0217"
[7b56 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3
[7b57 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[7b58 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[7b59 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP 44c87d6d29f5a901134fda071a7edf7126a7788becd3944cea03a9d24174d773}
[7b5a 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[7b5b 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 72 a5 c1 32 5a 31 cb 60 b3 b0 9f 31 fb e2 01 |.r..2Z1.`...1...|
00000010 32 aa cf 38 87 9b 54 01 5a 72 e1 15 3e 24 f3 30 |2..8..T.Zr..>$.0|
[7b5c 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 0c 3f dc 25 b0 83 b7 33 ea a5 ae |0D. ".?.%...3...|
00000010 ba 8c 5f d9 7b a7 f8 31 2c 0a c4 a0 5e fe c9 69 |.._.{..1,...^..i|
00000020 b5 0c 00 8b 02 20 0b b3 a7 bc 1f d6 77 20 f8 21 |..... ......w .!|
00000030 13 1f 5b 5b 6e 4b 21 8f 16 d6 5b ba 63 7a 29 64 |..[[nK!...[.cz)d|
00000040 35 6e 46 da 44 eb |5nF.D.|
[7b5d 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b5e 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b5f 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b60 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[7b61 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b62 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc00392e800, header channel_header:"\010\003\032\014\010\323\345\301\362\005\020\334\327\352\237\001\"\017businesschannel*@5b73472bf0cb9bbbff4e4a7325bf5b5f87663fd3b6b6b6f9756e7fa8b8e54198:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQO/PWArm1t3i/tKeMC7OVzzAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABOsthMItxOiQ\n2q8uaam4VvMJ2YsES2AMAJVbuRngSjcnRXBB9Xza2SdB60ycofngoZDYiY2Tro2+\nXDkmSSgHBoijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIFXg282MUjb2oOUasFo56uMuXM4YvgWMtT2OrWxN45eVMAoGCCqGSM49\nBAMCA0gAMEUCIQC9yOVdG0wK+yXEeZefUKHHoN0hrMgrJ/d4y5a2RRIx6AIgXhwg\npnWuUMQ+CNf2XrYWYElLritc4lD3dQVBqCL4zeo=\n-----END CERTIFICATE-----\n\022\030\020T)\024\001\272\2532\266\372\314{)X\232\277\310\002\335\010\3531\0217"
[7b63 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions
[7b64 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4045 bytes, seq: 8}, Envelope: 4075 bytes, Signature: 0 bytes to 1 peers
[7b65 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid
[7b66 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b67 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s(<nil>)
[7b68 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[7b69 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7b6a 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [5b73472bf0cb9bbbff4e4a7325bf5b5f87663fd3b6b6b6f9756e7fa8b8e54198]
[7b6b 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4045 bytes, seq: 8}, Envelope: 4075 bytes, Signature: 0 bytes
[7b6c 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x35, 0x62, 0x37, 0x33, 0x34, 0x37, 0x32, 0x62, 0x66, 0x30, 0x63, 0x62, 0x39, 0x62, 0x62, 0x62, 0x66, 0x66, 0x34, 0x65, 0x34, 0x61, 0x37, 0x33, 0x32, 0x35, 0x62, 0x66, 0x35, 0x62, 0x35, 0x66, 0x38, 0x37, 0x36, 0x36, 0x33, 0x66, 0x64, 0x33, 0x62, 0x36, 0x62, 0x36, 0x62, 0x36, 0x66, 0x39, 0x37, 0x35, 0x36, 0x65, 0x37, 0x66, 0x61, 0x38, 0x62, 0x38, 0x65, 0x35, 0x34, 0x31, 0x39, 0x38}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x35, 0x62, 0x37, 0x33, 0x34, 0x37, 0x32, 0x62, 0x66, 0x30, 0x63, 0x62, 0x39, 0x62, 0x62, 0x62, 0x66, 0x66, 0x34, 0x65, 0x34, 0x61, 0x37, 0x33, 0x32, 0x35, 0x62, 0x66, 0x35, 0x62, 0x35, 0x66, 0x38, 0x37, 0x36, 0x36, 0x33, 0x66, 0x64, 0x33, 0x62, 0x36, 0x62, 0x36, 0x62, 0x36, 0x66, 0x39, 0x37, 0x35, 0x36, 0x65, 0x37, 0x66, 0x61, 0x38, 0x62, 0x38, 0x65, 0x35, 0x34, 0x31, 0x39, 0x38, 0xff}]
[7b6d 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7b6e 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction with plugins
[7b6f 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch starts for bytes 0xc003443000
[7b70 02-22 00:16:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [de4ff2fe-45ae-4c8b-bbce-bbc676f5fbe4]
[7b71 02-22 00:16:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/metadata/exp02
[7b72 02-22 00:16:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[7b73 02-22 00:16:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo
[7b74 02-22 00:16:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo
[7b75 02-22 00:16:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections
[7b76 02-22 00:16:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [de4ff2fe-45ae-4c8b-bbce-bbc676f5fbe4]
[7b77 02-22 00:16:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 5b73472bf0cb9bbbff4e4a7325bf5b5f87663fd3b6b6b6f9756e7fa8b8e54198, seq 0 out of 1 in block 8 for channel businesschannel with validation plugin vscc with plugin
[7b78 02-22 00:16:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [063e8edd-396e-4773-b09a-ddbb5c3c0bdc]
[7b79 02-22 00:16:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [063e8edd-396e-4773-b09a-ddbb5c3c0bdc]
[7b7a 02-22 00:16:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a 98 c1 5b 6d d1 6e 76 a5 af 83 9f 6b e4 c9 47 |J..[m.nv....k..G|
00000010 81 f1 5e e3 cb 4c 47 45 3d 2a da fa 7d 1d 32 fe |..^..LGE=*..}.2.|
[7b7b 02-22 00:16:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 79 b7 80 f9 3f 91 8c 00 c2 a7 53 |0D. iy...?.....S|
00000010 8f 2d fa c4 d5 cd 24 ad 69 db a4 04 fe ea 9c f6 |.-....$.i.......|
00000020 b0 fa 85 e4 02 20 76 92 99 b4 4e fe 7f 8c 19 c4 |..... v...N.....|
00000030 3e a7 08 a7 95 dc e4 30 4f 8b 1e eb 53 44 d8 ec |>......0O...SD..|
00000040 7a 01 24 5d b5 c7 |z.$]..|
[7b7c 02-22 00:16:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7b7d 02-22 00:16:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375cf0 gate 1582330581488973000 evaluation starts
[7b7e 02-22 00:16:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375cf0 signed by 0 principal evaluation starts (used [false])
[7b7f 02-22 00:16:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375cf0 processing identity 0 - &{Org1MSP 7d0df2506ac221e9752cec5e841f5c7482dfa0c77748a65771953394012282dd}
[7b80 02-22 00:16:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375cf0 principal evaluation succeeds for identity 0
[7b81 02-22 00:16:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375cf0 signed by 1 principal evaluation starts (used [true])
[7b82 02-22 00:16:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375cf0 skipping identity 0 because it has already been used
[7b83 02-22 00:16:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375cf0 principal evaluation fails
[7b84 02-22 00:16:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000375cf0 gate 1582330581488973000 evaluation succeeds
[7b85 02-22 00:16:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [a93bb41b-1616-43d2-a5ab-773149c2ee86]
[7b86 02-22 00:16:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a93bb41b-1616-43d2-a5ab-773149c2ee86]
[7b87 02-22 00:16:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU block 8, namespace: exp02, tx 0 validation results is: <nil>
[7b88 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 5b73472bf0cb9bbbff4e4a7325bf5b5f87663fd3b6b6b6f9756e7fa8b8e54198 appears to be valid
[7b89 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Dispatch completes env bytes 0xc003443000
[7b8a 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc005343bc0 env 0xc002bc2550 txn 0
[7b8b 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[7b8c 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [8] in 45ms
[7b8d 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[7b8e 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 0 private write sets from cache. channel=businesschannel
[7b8f 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from transient store channel=businesschannel
[7b90 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [8] channel=businesschannel
[7b91 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [8]
[7b92 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[7b93 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[7b94 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[7b95 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [8]
[7b96 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[7b97 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION
[7b98 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[7b99 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}
[7b9a 02-22 00:16:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[7b9b 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}
[7b9c 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[7b9d 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}
[7b9e 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b
[7b9f 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}
[7ba0 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Block [8] Transaction index [0] TxId [5b73472bf0cb9bbbff4e4a7325bf5b5f87663fd3b6b6b6f9756e7fa8b8e54198] marked as valid by state validator. ContainsPostOrderWrites [false]
[7ba1 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003378d80), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003378dc0)}
[7ba2 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[7ba3 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[7ba4 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[7ba5 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [8]
[7ba6 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [8] to storage
[7ba7 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [8] to pvt block store
[7ba8 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [8]
[7ba9 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [8]
[7baa 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=8, blockHash=[]byte{0xe6, 0x53, 0xba, 0xcb, 0xab, 0xd8, 0x5, 0x3d, 0x23, 0xa1, 0xa4, 0x74, 0x98, 0x17, 0xd6, 0x79, 0xbb, 0x97, 0x54, 0x95, 0xf8, 0xba, 0xc9, 0x81, 0xc1, 0x2f, 0xbc, 0x12, 0x45, 0xf4, 0x64, 0x28} txOffsets=
txId=5b73472bf0cb9bbbff4e4a7325bf5b5f87663fd3b6b6b6f9756e7fa8b8e54198 locPointer=offset=70, bytesLength=3035
]
[7bab 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=101649, bytesLength=3035] for tx ID: [5b73472bf0cb9bbbff4e4a7325bf5b5f87663fd3b6b6b6f9756e7fa8b8e54198] to txid-index
[7bac 02-22 00:16:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=101649, bytesLength=3035] for tx number:[0] ID: [5b73472bf0cb9bbbff4e4a7325bf5b5f87663fd3b6b6b6f9756e7fa8b8e54198] to blockNumTranNum index
[7bad 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[105646], isChainEmpty=[false], lastBlockNumber=[8]
[7bae 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [8] transactions to state database
[7baf 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[7bb0 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[7bb1 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[7bb2 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[7bb3 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dexp02a] key(bytes)=[[]byte{0x64, 0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]
[7bb4 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dexp02b] key(bytes)=[[]byte{0x64, 0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]
[7bb5 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[7bb6 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [9]
[7bb7 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}]
[7bb8 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [9]
[7bb9 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[7bba 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [8] transactions to history database
[7bbb 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [8] with [1] transactions
[7bbc 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [8]
[7bbd 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [8] with 1 transaction(s) in 21ms (state_validation=11ms block_and_pvtdata_commit=6ms state_commit=2ms) commitHash=[a9f80b8352efcf2542fba21f24b2df147121800764308dee595bc4da04ef79ed]
[7bbe 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A7B121408ACB284A6AEA4E4FA15...0F0A0A5F6C6966656379636C65120131
[7bbf 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D390BBF9B3AE000035242FDD01A19CDAB87F7886F11301389E432C9A0B7F817C
[7bc0 02-22 00:16:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [8] with 1 transaction(s)
[7bc1 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:45004
[7bc2 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel=businesschannel txID=7d892b9c mspID=Org1MSP
[7bc3 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 51 0d 8c b1 00 5a 97 dd d5 3e fc cf 4f 4d 18 |.Q....Z...>..OM.|
00000010 4d 1a 6c c7 d5 bd f0 1f 13 07 32 ed f4 0a b4 75 |M.l.......2....u|
[7bc4 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b b3 8c 35 ef e2 11 68 73 e9 04 34 |0D. +..5...hs..4|
00000010 08 4a 2c bd e5 30 bd 1c 77 c0 48 cb ce 58 a0 f8 |.J,..0..w.H..X..|
00000020 a1 c1 cf 2e 02 20 2e e1 42 ed bd 58 7c 46 11 49 |..... ..B..X|F.I|
00000030 24 6b 22 d9 d0 d8 4c 79 f3 11 46 a8 ec a1 63 e6 |$k"...Ly..F...c.|
00000040 67 15 e4 50 42 dd |g..PB.|
[7bc5 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel=businesschannel txID=7d892b9c mspID=Org1MSP
[7bc6 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [7d892b9c48630bf3254617c1f9822d8167f1427f772dd1c7397644f15a9f5b5d]
[7bc7 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x37, 0x64, 0x38, 0x39, 0x32, 0x62, 0x39, 0x63, 0x34, 0x38, 0x36, 0x33, 0x30, 0x62, 0x66, 0x33, 0x32, 0x35, 0x34, 0x36, 0x31, 0x37, 0x63, 0x31, 0x66, 0x39, 0x38, 0x32, 0x32, 0x64, 0x38, 0x31, 0x36, 0x37, 0x66, 0x31, 0x34, 0x32, 0x37, 0x66, 0x37, 0x37, 0x32, 0x64, 0x64, 0x31, 0x63, 0x37, 0x33, 0x39, 0x37, 0x36, 0x34, 0x34, 0x66, 0x31, 0x35, 0x61, 0x39, 0x66, 0x35, 0x62, 0x35, 0x64}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x37, 0x64, 0x38, 0x39, 0x32, 0x62, 0x39, 0x63, 0x34, 0x38, 0x36, 0x33, 0x30, 0x62, 0x66, 0x33, 0x32, 0x35, 0x34, 0x36, 0x31, 0x37, 0x63, 0x31, 0x66, 0x39, 0x38, 0x32, 0x32, 0x64, 0x38, 0x31, 0x36, 0x37, 0x66, 0x31, 0x34, 0x32, 0x37, 0x66, 0x37, 0x37, 0x32, 0x64, 0x64, 0x31, 0x63, 0x37, 0x33, 0x39, 0x37, 0x36, 0x34, 0x34, 0x66, 0x31, 0x35, 0x61, 0x39, 0x66, 0x35, 0x62, 0x35, 0x64, 0xff}]
[7bc8 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose
[7bc9 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers)
[7bca 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers ==
[7bcb 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7bcc 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==
[7bcd 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 51 0d 8c b1 00 5a 97 dd d5 3e fc cf 4f 4d 18 |.Q....Z...>..OM.|
00000010 4d 1a 6c c7 d5 bd f0 1f 13 07 32 ed f4 0a b4 75 |M.l.......2....u|
[7bce 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b b3 8c 35 ef e2 11 68 73 e9 04 34 |0D. +..5...hs..4|
00000010 08 4a 2c bd e5 30 bd 1c 77 c0 48 cb ce 58 a0 f8 |.J,..0..w.H..X..|
00000020 a1 c1 cf 2e 02 20 2e e1 42 ed bd 58 7c 46 11 49 |..... ..B..X|F.I|
00000030 24 6b 22 d9 d0 d8 4c 79 f3 11 46 a8 ec a1 63 e6 |$k"...Ly..F...c.|
00000040 67 15 e4 50 42 dd |g..PB.|
[7bcf 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7bd0 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d6710 gate 1582330581876536200 evaluation starts
[7bd1 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d6710 signed by 0 principal evaluation starts (used [false])
[7bd2 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d6710 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[7bd3 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d6710 principal evaluation succeeds for identity 0
[7bd4 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0008d6710 gate 1582330581876536200 evaluation succeeds
[7bd5 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers
[7bd6 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers
[7bd7 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers
[7bd8 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Writers
[7bd9 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[7bda 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [7d892b9c48630bf3254617c1f9822d8167f1427f772dd1c7397644f15a9f5b5d]
[7bdb 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[7bdc 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU [7d892b9c] getting chaincode data for exp02 on channel businesschannel
[7bdd 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence
[7bde 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=􏿿initialized
[7bdf 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[7be0 02-22 00:16:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU [7d892b9c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready
[7be1 02-22 00:16:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU [7d892b9c] handling GET_STATE from chaincode
[7be2 02-22 00:16:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU [7d892b9c] getting state for chaincode exp02, key a, channel businesschannel
[7be3 02-22 00:16:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a
[7be4 02-22 00:16:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU [7d892b9c] Completed GET_STATE. Sending RESPONSE
[7be5 02-22 00:16:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU [7d892b9c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[7be6 02-22 00:16:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU [7d892b9c] notifying Txid:7d892b9c48630bf3254617c1f9822d8167f1427f772dd1c7397644f15a9f5b5d, channelID:businesschannel
[7be7 02-22 00:16:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[7be8 02-22 00:16:21.88 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: exp02 duration: 5ms channel=businesschannel txID=7d892b9c
[7be9 02-22 00:16:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[7bea 02-22 00:16:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7d892b9c48630bf3254617c1f9822d8167f1427f772dd1c7397644f15a9f5b5d]
[7beb 02-22 00:16:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU escc for chaincode exp02 is escc channel=businesschannel txID=7d892b9c
[7bec 02-22 00:16:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A200FDF0964380200AA11C52AF9B0C8...455254494649434154452D2D2D2D2D0A
[7bed 02-22 00:16:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F9B944FF39C75A05F010347D3DD285A08D65237EE4FB218BE77A19A1C5D780E3
[7bee 02-22 00:16:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7d892b9c48630bf3254617c1f9822d8167f1427f772dd1c7397644f15a9f5b5d]
[7bef 02-22 00:16:21.88 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45004 grpc.code=OK grpc.call_duration=9.8328ms
[7bf0 02-22 00:16:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7bf1 02-22 00:16:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7bf2 02-22 00:16:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:10422405534057262138 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7bf3 02-22 00:16:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:10422405534057262138 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7bf4 02-22 00:16:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7bf5 02-22 00:16:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7bf6 02-22 00:16:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7bf7 02-22 00:16:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7bf8 02-22 00:16:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7bf9 02-22 00:16:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7bfa 02-22 00:16:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[7bfb 02-22 00:16:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7bfc 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[7bfd 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7bfe 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[7bff 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[7c00 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 54 b7 24 2c 93 e7 89 f4 ee 51 37 f4 83 42 54 |2T.$,.....Q7..BT|
00000010 bc c9 7c e9 52 69 d9 ff 2b d8 30 cf ca d8 ab 0e |..|.Ri..+.0.....|
[7c01 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 02 d2 0e 43 9b 80 4b 15 fc 73 35 |0D. u...C..K..s5|
00000010 89 fb 58 07 9b 94 7a b1 34 fc a9 41 eb ba 82 f7 |..X...z.4..A....|
00000020 40 fc 42 bd 02 20 02 70 c0 1d 6f 93 18 ab 68 8d |@.B.. .p..o...h.|
00000030 ec 97 e4 84 76 81 b4 8b e6 51 d0 1e 78 5d b0 33 |....v....Q..x].3|
00000040 c3 8a 27 39 16 44 |..'9.D|
[7c02 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[7c03 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 27 7f ae a5 6b 61 cc 7a 7b 2b a3 |0D. !'...ka.z{+.|
00000010 a0 d2 11 58 f2 1a 1b ca dc 3c 9e d3 0d d9 e1 be |...X.....<......|
00000020 9d b6 39 06 02 20 7e 6e 9b 0c 9a 46 bd aa 03 6e |..9.. ~n...F...n|
00000030 cc 94 30 cb ab f0 2f 91 48 79 05 39 b5 02 21 a3 |..0.../.Hy.9..!.|
00000040 f2 4b fa 60 44 23 |.K.`D#|
[7c04 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[7c05 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[7c06 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:89
[7c07 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:89
[7c08 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[7c09 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c0a 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c0b 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c0c 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[7c0d 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c0e 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c0f 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[7c10 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[7c11 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[7c12 02-22 00:16:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c13 02-22 00:16:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:11990377484313084131 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7c14 02-22 00:16:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:11990377484313084131 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[7c15 02-22 00:16:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[7c16 02-22 00:16:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c17 02-22 00:16:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:7915139675802338281 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7c18 02-22 00:16:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:7915139675802338281 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7c19 02-22 00:16:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:7915139675802338281 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7c1a 02-22 00:16:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c1b 02-22 00:16:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c1c 02-22 00:16:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c1d 02-22 00:16:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c1e 02-22 00:16:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c1f 02-22 00:16:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c20 02-22 00:16:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[7c21 02-22 00:16:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c22 02-22 00:16:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[7c23 02-22 00:16:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7100093350590665381 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[7c24 02-22 00:16:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[7c25 02-22 00:16:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5375145757733820887 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[7c26 02-22 00:16:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[7c27 02-22 00:16:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5565876305520964574 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[7c28 02-22 00:16:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5565876305520964574 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7c29 02-22 00:16:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c2a 02-22 00:16:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7100093350590665381 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7c2b 02-22 00:16:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c2c 02-22 00:16:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5375145757733820887 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[7c2d 02-22 00:16:22.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c2e 02-22 00:16:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5375145757733820887 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[7c2f 02-22 00:16:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5375145757733820887 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[7c30 02-22 00:16:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5375145757733820887 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 153 bytes, Signature: 0 bytes
[7c31 02-22 00:16:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c32 02-22 00:16:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5565876305520964574 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[7c33 02-22 00:16:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5565876305520964574 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[7c34 02-22 00:16:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c35 02-22 00:16:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7100093350590665381 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[7c36 02-22 00:16:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7100093350590665381 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[7c37 02-22 00:16:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c38 02-22 00:16:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:45008
[7c39 02-22 00:16:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel=businesschannel txID=3e8f27af mspID=Org1MSP
[7c3a 02-22 00:16:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 34 c2 d5 64 a1 f3 09 ae 87 2d f1 96 66 0e 52 6a |4..d.....-..f.Rj|
00000010 b0 d3 32 0c 7a 96 fc 2b 97 e5 61 42 ca ee ca d6 |..2.z..+..aB....|
[7c3b 02-22 00:16:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac 5f 1b 99 d0 64 0d 37 84 a4 13 |0E.!.._...d.7...|
00000010 3a cb 06 8b 20 6a c3 3f a0 23 80 b2 cc d9 06 0f |:... j.?.#......|
00000020 1a 80 a6 69 5a 02 20 56 8e b6 4b 4f 5f 15 46 5c |...iZ. V..KO_.F\|
00000030 45 73 21 ae b9 66 d3 25 6f 8b 72 fe 78 5c 13 3e |Es!..f.%o.r.x\.>|
00000040 c1 3e b6 35 d1 7f e3 |.>.5...|
[7c3c 02-22 00:16:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel=businesschannel txID=3e8f27af mspID=Org1MSP
[7c3d 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [3e8f27af290675fa5b7082dc582d49868f771800017d74e5c3dadb55adaff6b4]
[7c3e 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x33, 0x65, 0x38, 0x66, 0x32, 0x37, 0x61, 0x66, 0x32, 0x39, 0x30, 0x36, 0x37, 0x35, 0x66, 0x61, 0x35, 0x62, 0x37, 0x30, 0x38, 0x32, 0x64, 0x63, 0x35, 0x38, 0x32, 0x64, 0x34, 0x39, 0x38, 0x36, 0x38, 0x66, 0x37, 0x37, 0x31, 0x38, 0x30, 0x30, 0x30, 0x31, 0x37, 0x64, 0x37, 0x34, 0x65, 0x35, 0x63, 0x33, 0x64, 0x61, 0x64, 0x62, 0x35, 0x35, 0x61, 0x64, 0x61, 0x66, 0x66, 0x36, 0x62, 0x34}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x33, 0x65, 0x38, 0x66, 0x32, 0x37, 0x61, 0x66, 0x32, 0x39, 0x30, 0x36, 0x37, 0x35, 0x66, 0x61, 0x35, 0x62, 0x37, 0x30, 0x38, 0x32, 0x64, 0x63, 0x35, 0x38, 0x32, 0x64, 0x34, 0x39, 0x38, 0x36, 0x38, 0x66, 0x37, 0x37, 0x31, 0x38, 0x30, 0x30, 0x30, 0x31, 0x37, 0x64, 0x37, 0x34, 0x65, 0x35, 0x63, 0x33, 0x64, 0x61, 0x64, 0x62, 0x35, 0x35, 0x61, 0x64, 0x61, 0x66, 0x66, 0x36, 0x62, 0x34, 0xff}]
[7c3f 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU [3e8f27af] getting chaincode data for qscc on channel businesschannel
[7c40 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[7c41 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel
[7c42 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo
[7c43 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers)
[7c44 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7c45 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7c46 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7c47 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 34 c2 d5 64 a1 f3 09 ae 87 2d f1 96 66 0e 52 6a |4..d.....-..f.Rj|
00000010 b0 d3 32 0c 7a 96 fc 2b 97 e5 61 42 ca ee ca d6 |..2.z..+..aB....|
[7c48 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac 5f 1b 99 d0 64 0d 37 84 a4 13 |0E.!.._...d.7...|
00000010 3a cb 06 8b 20 6a c3 3f a0 23 80 b2 cc d9 06 0f |:... j.?.#......|
00000020 1a 80 a6 69 5a 02 20 56 8e b6 4b 4f 5f 15 46 5c |...iZ. V..KO_.F\|
00000030 45 73 21 ae b9 66 d3 25 6f 8b 72 fe 78 5c 13 3e |Es!..f.%o.r.x\.>|
00000040 c1 3e b6 35 d1 7f e3 |.>.5...|
[7c49 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7c4a 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b590b0 gate 1582330582415381600 evaluation starts
[7c4b 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b590b0 signed by 0 principal evaluation starts (used [false])
[7c4c 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b590b0 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[7c4d 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b590b0 principal evaluation succeeds for identity 0
[7c4e 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b590b0 gate 1582330582415381600 evaluation succeeds
[7c4f 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[7c50 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7c51 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7c52 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7c53 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU [3e8f27af] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[7c54 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU [3e8f27af] notifying Txid:3e8f27af290675fa5b7082dc582d49868f771800017d74e5c3dadb55adaff6b4, channelID:businesschannel
[7c55 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[7c56 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: qscc duration: 7ms channel=businesschannel txID=3e8f27af
[7c57 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU escc for chaincode qscc is escc channel=businesschannel txID=3e8f27af
[7c58 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A204EF27421FFAF155678AF9B0E2EBA...455254494649434154452D2D2D2D2D0A
[7c59 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C3E4493648B4A2549B22D3B30996F647B0B8666803CC0ABB3F54493F477899F2
[7c5a 02-22 00:16:22.41 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45008 grpc.code=OK grpc.call_duration=10.5741ms
[7c5b 02-22 00:16:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:45008: read: connection reset by peer
[7c5c 02-22 00:16:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7c5d 02-22 00:16:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7c5e 02-22 00:16:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:88 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[7c5f 02-22 00:16:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:88 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[7c60 02-22 00:16:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c61 02-22 00:16:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:88 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[7c62 02-22 00:16:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[7c63 02-22 00:16:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c64 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7c65 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7c66 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7c67 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7c68 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7c69 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7c6a 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b c7 8e aa 86 ba ca 99 71 d6 be 4f 81 e1 21 cb |........q..O..!.|
00000010 3e a9 dc ae f1 f9 bd 71 c1 46 66 6d e2 1f 46 33 |>......q.Ffm..F3|
[7c6b 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 86 54 48 dc ea 09 33 90 dc 9c |0E.!...TH...3...|
00000010 18 fb fc ba 63 bb 58 78 6a 68 ac 75 18 7e c7 ac |....c.Xxjh.u.~..|
00000020 3e 29 87 8e b9 02 20 4b c3 d9 62 02 1c 9b 24 87 |>).... K..b...$.|
00000030 d6 28 f8 79 3d bc db 95 16 c4 d3 ff 4f 29 d3 cb |.(.y=.......O)..|
00000040 57 6f c5 2c 4b ba d0 |Wo.,K..|
[7c6c 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7c6d 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cadbd0 gate 1582330582473279300 evaluation starts
[7c6e 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cadbd0 signed by 0 principal evaluation starts (used [false])
[7c6f 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cadbd0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7c70 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cadbd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7c71 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cadbd0 principal evaluation fails
[7c72 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cadbd0 gate 1582330582473279300 evaluation fails
[7c73 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7c74 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7c75 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7c76 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b c7 8e aa 86 ba ca 99 71 d6 be 4f 81 e1 21 cb |........q..O..!.|
00000010 3e a9 dc ae f1 f9 bd 71 c1 46 66 6d e2 1f 46 33 |>......q.Ffm..F3|
[7c77 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 86 54 48 dc ea 09 33 90 dc 9c |0E.!...TH...3...|
00000010 18 fb fc ba 63 bb 58 78 6a 68 ac 75 18 7e c7 ac |....c.Xxjh.u.~..|
00000020 3e 29 87 8e b9 02 20 4b c3 d9 62 02 1c 9b 24 87 |>).... K..b...$.|
00000030 d6 28 f8 79 3d bc db 95 16 c4 d3 ff 4f 29 d3 cb |.(.y=.......O)..|
00000040 57 6f c5 2c 4b ba d0 |Wo.,K..|
[7c78 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7c79 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc24d0 gate 1582330582475838800 evaluation starts
[7c7a 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc24d0 signed by 0 principal evaluation starts (used [false])
[7c7b 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc24d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7c7c 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc24d0 principal evaluation succeeds for identity 0
[7c7d 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc24d0 gate 1582330582475838800 evaluation succeeds
[7c7e 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7c7f 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7c80 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7c81 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7c82 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:88 , Envelope: 83 bytes, Signature: 71 bytes
[7c83 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:88 , Envelope: 83 bytes, Signature: 71 bytes]}
[7c84 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:88
[7c85 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:88
[7c86 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:87 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[7c87 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c88 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c89 02-22 00:16:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[7c8a 02-22 00:16:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c8b 02-22 00:16:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c8c 02-22 00:16:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c8e 02-22 00:16:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[7c8f 02-22 00:16:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[7c8d 02-22 00:16:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c90 02-22 00:16:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[7c91 02-22 00:16:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c92 02-22 00:16:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151055
[7c93 02-22 00:16:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D47A1100A15CD501A6322B6A4E7A40D35B9B1310584D5E89EEEF2A6C474E005A
[7c94 02-22 00:16:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[7c95 02-22 00:16:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[7c96 02-22 00:16:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c97 02-22 00:16:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[7c98 02-22 00:16:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[7c99 02-22 00:16:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7c9a 02-22 00:16:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[7c9b 02-22 00:16:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[7c9c 02-22 00:16:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c9d 02-22 00:16:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[7c9f 02-22 00:16:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7c9e 02-22 00:16:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[7ca0 02-22 00:16:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ca1 02-22 00:16:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[7ca2 02-22 00:16:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ca3 02-22 00:16:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[7ca4 02-22 00:16:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[7ca5 02-22 00:16:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 7a 11 00 a1 5c d5 01 a6 32 2b 6a 4e 7a 40 d3 |.z...\...2+jNz@.|
00000010 5b 9b 13 10 58 4d 5e 89 ee ef 2a 6c 47 4e 00 5a |[...XM^...*lGN.Z|
[7ca6 02-22 00:16:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 b5 8f 35 e9 4a 5b 14 a3 4d 27 |0E.!....5.J[..M'|
00000010 08 9e 94 2f 4a f5 c8 d9 59 04 18 27 5a 9a 53 9c |.../J...Y..'Z.S.|
00000020 0b 8e 7f 4a b9 02 20 21 00 12 f5 e2 37 6d db 7d |...J.. !....7m.}|
00000030 12 23 f7 6b a5 a2 d2 91 64 29 be a5 ad cb 75 fb |.#.k....d)....u.|
00000040 94 ac f2 a3 f1 a1 dc |.......|
[7ca7 02-22 00:16:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[7ca8 02-22 00:16:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 22 bc 08 0c c7 ca a6 39 5a 05 |0E.!.."......9Z.|
00000010 d3 e3 37 58 c8 97 91 78 62 a9 86 c6 a6 d8 2c 0d |..7X...xb.....,.|
00000020 cd d7 bb 0d f2 02 20 5e 20 60 06 b2 ce d2 5f dc |...... ^ `...._.|
00000030 20 27 fd 3e c8 9f 6a ef 4f 12 d8 4b 48 55 d8 92 | '.>..j.O..KHU..|
00000040 22 fa 55 37 ea 98 0e |".U7...|
[7ca9 02-22 00:16:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7caa 02-22 00:16:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7cab 02-22 00:16:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7cac 02-22 00:16:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7cad 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[7cae 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7caf 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[7cb0 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[7cb1 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 7a 11 00 a1 5c d5 01 a6 32 2b 6a 4e 7a 40 d3 |.z...\...2+jNz@.|
00000010 5b 9b 13 10 58 4d 5e 89 ee ef 2a 6c 47 4e 00 5a |[...XM^...*lGN.Z|
[7cb2 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 b5 8f 35 e9 4a 5b 14 a3 4d 27 |0E.!....5.J[..M'|
00000010 08 9e 94 2f 4a f5 c8 d9 59 04 18 27 5a 9a 53 9c |.../J...Y..'Z.S.|
00000020 0b 8e 7f 4a b9 02 20 21 00 12 f5 e2 37 6d db 7d |...J.. !....7m.}|
00000030 12 23 f7 6b a5 a2 d2 91 64 29 be a5 ad cb 75 fb |.#.k....d)....u.|
00000040 94 ac f2 a3 f1 a1 dc |.......|
[7cb3 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7cb4 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7cb5 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7cb6 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[7cb7 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 54 b7 24 2c 93 e7 89 f4 ee 51 37 f4 83 42 54 |2T.$,.....Q7..BT|
00000010 bc c9 7c e9 52 69 d9 ff 2b d8 30 cf ca d8 ab 0e |..|.Ri..+.0.....|
[7cb8 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 02 d2 0e 43 9b 80 4b 15 fc 73 35 |0D. u...C..K..s5|
00000010 89 fb 58 07 9b 94 7a b1 34 fc a9 41 eb ba 82 f7 |..X...z.4..A....|
00000020 40 fc 42 bd 02 20 02 70 c0 1d 6f 93 18 ab 68 8d |@.B.. .p..o...h.|
00000030 ec 97 e4 84 76 81 b4 8b e6 51 d0 1e 78 5d b0 33 |....v....Q..x].3|
00000040 c3 8a 27 39 16 44 |..'9.D|
[7cb9 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes
[7cba 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7cbb 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[7cbc 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7cbd 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7cbe 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7cbf 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7cc0 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7cc1 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7cc2 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7cc4 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b c7 8e aa 86 ba ca 99 71 d6 be 4f 81 e1 21 cb |........q..O..!.|
00000010 3e a9 dc ae f1 f9 bd 71 c1 46 66 6d e2 1f 46 33 |>......q.Ffm..F3|
[7cc5 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 86 54 48 dc ea 09 33 90 dc 9c |0E.!...TH...3...|
00000010 18 fb fc ba 63 bb 58 78 6a 68 ac 75 18 7e c7 ac |....c.Xxjh.u.~..|
00000020 3e 29 87 8e b9 02 20 4b c3 d9 62 02 1c 9b 24 87 |>).... K..b...$.|
00000030 d6 28 f8 79 3d bc db 95 16 c4 d3 ff 4f 29 d3 cb |.(.y=.......O)..|
00000040 57 6f c5 2c 4b ba d0 |Wo.,K..|
[7cc3 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[7cc6 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[7cc7 02-22 00:16:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7cc8 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e62780 gate 1582330582600216900 evaluation starts
[7cc9 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e62780 signed by 0 principal evaluation starts (used [false])
[7cca 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e62780 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7ccb 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e62780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7ccc 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e62780 principal evaluation fails
[7ccd 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e62780 gate 1582330582600216900 evaluation fails
[7cce 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7ccf 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7cd0 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7cd1 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b c7 8e aa 86 ba ca 99 71 d6 be 4f 81 e1 21 cb |........q..O..!.|
00000010 3e a9 dc ae f1 f9 bd 71 c1 46 66 6d e2 1f 46 33 |>......q.Ffm..F3|
[7cd2 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 86 54 48 dc ea 09 33 90 dc 9c |0E.!...TH...3...|
00000010 18 fb fc ba 63 bb 58 78 6a 68 ac 75 18 7e c7 ac |....c.Xxjh.u.~..|
00000020 3e 29 87 8e b9 02 20 4b c3 d9 62 02 1c 9b 24 87 |>).... K..b...$.|
00000030 d6 28 f8 79 3d bc db 95 16 c4 d3 ff 4f 29 d3 cb |.(.y=.......O)..|
00000040 57 6f c5 2c 4b ba d0 |Wo.,K..|
[7cd3 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7cd4 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e630c0 gate 1582330582602119500 evaluation starts
[7cd5 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e630c0 signed by 0 principal evaluation starts (used [false])
[7cd6 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e630c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7cd7 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e630c0 principal evaluation succeeds for identity 0
[7cd8 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e630c0 gate 1582330582602119500 evaluation succeeds
[7cd9 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7cda 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7cdb 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7cdc 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7cdd 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:88 , Envelope: 83 bytes, Signature: 71 bytes
[7cde 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7cdf 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ce0 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[7ce1 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ce2 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[7ce3 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 54 b7 24 2c 93 e7 89 f4 ee 51 37 f4 83 42 54 |2T.$,.....Q7..BT|
00000010 bc c9 7c e9 52 69 d9 ff 2b d8 30 cf ca d8 ab 0e |..|.Ri..+.0.....|
[7ce4 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 02 d2 0e 43 9b 80 4b 15 fc 73 35 |0D. u...C..K..s5|
00000010 89 fb 58 07 9b 94 7a b1 34 fc a9 41 eb ba 82 f7 |..X...z.4..A....|
00000020 40 fc 42 bd 02 20 02 70 c0 1d 6f 93 18 ab 68 8d |@.B.. .p..o...h.|
00000030 ec 97 e4 84 76 81 b4 8b e6 51 d0 1e 78 5d b0 33 |....v....Q..x].3|
00000040 c3 8a 27 39 16 44 |..'9.D|
[7ce5 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes
[7ce6 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ce7 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[7ce8 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 7a 11 00 a1 5c d5 01 a6 32 2b 6a 4e 7a 40 d3 |.z...\...2+jNz@.|
00000010 5b 9b 13 10 58 4d 5e 89 ee ef 2a 6c 47 4e 00 5a |[...XM^...*lGN.Z|
[7ce9 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 b5 8f 35 e9 4a 5b 14 a3 4d 27 |0E.!....5.J[..M'|
00000010 08 9e 94 2f 4a f5 c8 d9 59 04 18 27 5a 9a 53 9c |.../J...Y..'Z.S.|
00000020 0b 8e 7f 4a b9 02 20 21 00 12 f5 e2 37 6d db 7d |...J.. !....7m.}|
00000030 12 23 f7 6b a5 a2 d2 91 64 29 be a5 ad cb 75 fb |.#.k....d)....u.|
00000040 94 ac f2 a3 f1 a1 dc |.......|
[7cea 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7ceb 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes
[7cec 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ced 02-22 00:16:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7cee 02-22 00:16:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7cef 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7cf0 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[7cf1 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[7cf2 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7cf3 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7cf4 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7cf5 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7cf6 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7cf7 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7cf8 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7cf9 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 21 e2 5a 27 4d 7c b1 a7 19 4b 24 ce ca d3 cf c7 |!.Z'M|...K$.....|
00000010 83 ff 2a 90 af d9 4a 9e 5c 2e 04 62 ad 8a 34 24 |..*...J.\..b..4$|
[7cfa 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a 45 e8 fc e0 a9 5d 31 bf 70 08 7f |0D. ZE....]1.p..|
00000010 02 2a 98 94 25 db 5e b6 19 93 9b b2 40 65 66 52 |.*..%.^.....@efR|
00000020 d6 bf 4d 2e 02 20 5a 16 d6 e9 18 e7 a1 52 6a 6d |..M.. Z......Rjm|
00000030 2e a2 aa 5c 70 23 cc d2 c3 ef 32 e2 a3 93 89 e3 |...\p#....2.....|
00000040 17 28 ba a5 a1 39 |.(...9|
[7cfb 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7cfc 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dad9a0 gate 1582330582656448800 evaluation starts
[7cfd 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dad9a0 signed by 0 principal evaluation starts (used [false])
[7cfe 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dad9a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7cff 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dad9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7d00 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dad9a0 principal evaluation fails
[7d01 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002dad9a0 gate 1582330582656448800 evaluation fails
[7d02 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7d03 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7d04 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7d05 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 21 e2 5a 27 4d 7c b1 a7 19 4b 24 ce ca d3 cf c7 |!.Z'M|...K$.....|
00000010 83 ff 2a 90 af d9 4a 9e 5c 2e 04 62 ad 8a 34 24 |..*...J.\..b..4$|
[7d06 02-22 00:16:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a 45 e8 fc e0 a9 5d 31 bf 70 08 7f |0D. ZE....]1.p..|
00000010 02 2a 98 94 25 db 5e b6 19 93 9b b2 40 65 66 52 |.*..%.^.....@efR|
00000020 d6 bf 4d 2e 02 20 5a 16 d6 e9 18 e7 a1 52 6a 6d |..M.. Z......Rjm|
00000030 2e a2 aa 5c 70 23 cc d2 c3 ef 32 e2 a3 93 89 e3 |...\p#....2.....|
00000040 17 28 ba a5 a1 39 |.(...9|
[7d07 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7d08 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a2a0 gate 1582330582662234100 evaluation starts
[7d09 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a2a0 signed by 0 principal evaluation starts (used [false])
[7d0a 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a2a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7d0b 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a2a0 principal evaluation succeeds for identity 0
[7d0c 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0a2a0 gate 1582330582662234100 evaluation succeeds
[7d0d 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7d0e 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7d0f 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7d10 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7d11 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes
[7d12 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes]}
[7d13 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:86
[7d14 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:86
[7d15 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:85 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[7d16 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d17 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d18 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d19 02-22 00:16:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[7d1a 02-22 00:16:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d1b 02-22 00:16:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d1c 02-22 00:16:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d1d 02-22 00:16:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[7d1e 02-22 00:16:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[7d1f 02-22 00:16:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[7d20 02-22 00:16:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d21 02-22 00:16:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:45012
[7d22 02-22 00:16:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel=businesschannel txID=79df9700 mspID=Org1MSP
[7d23 02-22 00:16:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 51 70 c2 8d c6 4d a2 97 e6 47 10 9f 85 75 0a |.Qp...M...G...u.|
00000010 82 c4 d5 42 88 52 a4 37 34 4f 96 78 3e 6e ae 49 |...B.R.74O.x>n.I|
[7d24 02-22 00:16:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 39 1f 4b 6f b0 9c 23 5e 6d 31 fd 38 |0C. 9.Ko..#^m1.8|
00000010 4a 0e b3 2c 61 85 06 94 8b 0b 8c 94 bb 13 88 f8 |J..,a...........|
00000020 ce 91 49 1c 02 1f 53 95 f0 ec 71 41 20 2b 5d 49 |..I...S...qA +]I|
00000030 15 9c 53 c9 aa 61 2f f8 d8 32 8b 66 80 f4 59 e1 |..S..a/..2.f..Y.|
00000040 fc 45 cd 20 29 |.E. )|
[7d25 02-22 00:16:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel=businesschannel txID=79df9700 mspID=Org1MSP
[7d26 02-22 00:16:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [79df9700b6e053f8ec443beb2956ccac8c2ebc2df203546a0a08374f770d8f20]
[7d27 02-22 00:16:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x37, 0x39, 0x64, 0x66, 0x39, 0x37, 0x30, 0x30, 0x62, 0x36, 0x65, 0x30, 0x35, 0x33, 0x66, 0x38, 0x65, 0x63, 0x34, 0x34, 0x33, 0x62, 0x65, 0x62, 0x32, 0x39, 0x35, 0x36, 0x63, 0x63, 0x61, 0x63, 0x38, 0x63, 0x32, 0x65, 0x62, 0x63, 0x32, 0x64, 0x66, 0x32, 0x30, 0x33, 0x35, 0x34, 0x36, 0x61, 0x30, 0x61, 0x30, 0x38, 0x33, 0x37, 0x34, 0x66, 0x37, 0x37, 0x30, 0x64, 0x38, 0x66, 0x32, 0x30}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x37, 0x39, 0x64, 0x66, 0x39, 0x37, 0x30, 0x30, 0x62, 0x36, 0x65, 0x30, 0x35, 0x33, 0x66, 0x38, 0x65, 0x63, 0x34, 0x34, 0x33, 0x62, 0x65, 0x62, 0x32, 0x39, 0x35, 0x36, 0x63, 0x63, 0x61, 0x63, 0x38, 0x63, 0x32, 0x65, 0x62, 0x63, 0x32, 0x64, 0x66, 0x32, 0x30, 0x33, 0x35, 0x34, 0x36, 0x61, 0x30, 0x61, 0x30, 0x38, 0x33, 0x37, 0x34, 0x66, 0x37, 0x37, 0x30, 0x64, 0x38, 0x66, 0x32, 0x30, 0xff}]
[7d28 02-22 00:16:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU [79df9700] getting chaincode data for qscc on channel businesschannel
[7d29 02-22 00:16:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[7d2a 02-22 00:16:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetBlockByNumber on chain: businesschannel
[7d2b 02-22 00:16:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber
[7d2c 02-22 00:16:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers)
[7d2d 02-22 00:16:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7d2e 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7d2f 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7d30 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 51 70 c2 8d c6 4d a2 97 e6 47 10 9f 85 75 0a |.Qp...M...G...u.|
00000010 82 c4 d5 42 88 52 a4 37 34 4f 96 78 3e 6e ae 49 |...B.R.74O.x>n.I|
[7d31 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 39 1f 4b 6f b0 9c 23 5e 6d 31 fd 38 |0C. 9.Ko..#^m1.8|
00000010 4a 0e b3 2c 61 85 06 94 8b 0b 8c 94 bb 13 88 f8 |J..,a...........|
00000020 ce 91 49 1c 02 1f 53 95 f0 ec 71 41 20 2b 5d 49 |..I...S...qA +]I|
00000030 15 9c 53 c9 aa 61 2f f8 d8 32 8b 66 80 f4 59 e1 |..S..a/..2.f..Y.|
00000040 fc 45 cd 20 29 |.E. )|
[7d32 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7d33 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308d0f0 gate 1582330582721365100 evaluation starts
[7d34 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308d0f0 signed by 0 principal evaluation starts (used [false])
[7d35 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308d0f0 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[7d36 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308d0f0 principal evaluation succeeds for identity 0
[7d37 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00308d0f0 gate 1582330582721365100 evaluation succeeds
[7d38 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[7d39 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7d3a 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7d3b 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7d3c 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveBlockByNumber() - blockNum = [2]
[7d3d 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[52127]
[7d3e 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[53519], Going to peek [8] bytes
[7d3f 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[26007], placementInfo={fileNum=[0], startOffset=[52127], bytesOffset=[52130]}
[7d40 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU [79df9700] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[7d41 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU [79df9700] notifying Txid:79df9700b6e053f8ec443beb2956ccac8c2ebc2df203546a0a08374f770d8f20, channelID:businesschannel
[7d42 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[7d43 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: qscc duration: 5ms channel=businesschannel txID=79df9700
[7d44 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU escc for chaincode qscc is escc channel=businesschannel txID=79df9700
[7d45 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A206A1F6F6004F8A30EAAB378C1C0BF...455254494649434154452D2D2D2D2D0A
[7d46 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 39D08A1AE0BD07014D694DC5F9987142D21E6740EADDF099DD5D2EE6786464AA
[7d47 02-22 00:16:22.72 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45012 grpc.code=OK grpc.call_duration=9.2302ms
[7d48 02-22 00:16:22.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7d49 02-22 00:16:22.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:45012: read: connection reset by peer
[7d4a 02-22 00:16:22.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7d4b 02-22 00:16:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d4c 02-22 00:16:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d4d 02-22 00:16:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330581534657900 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes to 3 peers
[7d4e 02-22 00:16:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d4f 02-22 00:16:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d50 02-22 00:16:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330581534657900 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7d51 02-22 00:16:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d52 02-22 00:16:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330581534657900 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7d53 02-22 00:16:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d54 02-22 00:16:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330581534657900 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7d55 02-22 00:16:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d56 02-22 00:16:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d57 02-22 00:16:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d58 02-22 00:16:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[7d59 02-22 00:16:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[7d5a 02-22 00:16:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d5b 02-22 00:16:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[7d5c 02-22 00:16:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d5d 02-22 00:16:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[7d5e 02-22 00:16:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7d5f 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[7d60 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d61 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d62 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7d63 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7d64 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7d65 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7d66 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7d67 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7d68 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 8e c8 12 f3 4c 7c 60 31 de e7 09 0e c5 1c e1 |.....L|`1.......|
00000010 da 7a ff 33 7f b4 71 08 ef 00 b0 e2 96 e8 9e 15 |.z.3..q.........|
[7d69 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 4b c6 6f 0c cf 58 22 8c e4 a2 |0E.!..K.o..X"...|
00000010 c2 db b7 d4 2b 6e a3 3f 84 0a 33 8b 2c 09 5c eb |....+n.?..3.,.\.|
00000020 e8 67 f3 84 e7 02 20 34 81 2d 7e bb 9b 38 99 d8 |.g.... 4.-~..8..|
00000030 36 b9 82 56 b6 08 e7 0f 85 0b c7 13 74 c5 7c 5f |6..V........t.|_|
00000040 82 38 8b 40 8f c8 47 |.8.@..G|
[7d6a 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7d6b 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ab1a0 gate 1582330583012524500 evaluation starts
[7d6c 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ab1a0 signed by 0 principal evaluation starts (used [false])
[7d6d 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ab1a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7d6e 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ab1a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7d6f 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ab1a0 principal evaluation fails
[7d70 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ab1a0 gate 1582330583012524500 evaluation fails
[7d71 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7d72 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7d73 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7d74 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 8e c8 12 f3 4c 7c 60 31 de e7 09 0e c5 1c e1 |.....L|`1.......|
00000010 da 7a ff 33 7f b4 71 08 ef 00 b0 e2 96 e8 9e 15 |.z.3..q.........|
[7d75 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 4b c6 6f 0c cf 58 22 8c e4 a2 |0E.!..K.o..X"...|
00000010 c2 db b7 d4 2b 6e a3 3f 84 0a 33 8b 2c 09 5c eb |....+n.?..3.,.\.|
00000020 e8 67 f3 84 e7 02 20 34 81 2d 7e bb 9b 38 99 d8 |.g.... 4.-~..8..|
00000030 36 b9 82 56 b6 08 e7 0f 85 0b c7 13 74 c5 7c 5f |6..V........t.|_|
00000040 82 38 8b 40 8f c8 47 |.8.@..G|
[7d76 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7d77 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031abaa0 gate 1582330583013015100 evaluation starts
[7d78 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031abaa0 signed by 0 principal evaluation starts (used [false])
[7d79 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031abaa0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7d7a 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031abaa0 principal evaluation succeeds for identity 0
[7d7b 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031abaa0 gate 1582330583013015100 evaluation succeeds
[7d7c 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7d7d 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7d7e 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7d7f 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7d80 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d81 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7d82 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7d83 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7d84 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7d85 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7d86 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7d87 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7d88 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 32 5c e4 a7 8a 5c 09 e4 a0 3d fa 3e c7 9f 86 |.2\...\...=.>...|
00000010 66 fe 23 5d 7f 26 dc dc c5 e1 85 7a 6c 5f de a9 |f.#].&.....zl_..|
[7d89 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 47 df d8 a0 1f 15 19 d6 4a 50 2d |0D. .G.......JP-|
00000010 0a 52 f5 e9 72 70 24 fb f0 79 48 fb 51 15 bd 77 |.R..rp$..yH.Q..w|
00000020 e9 10 13 64 02 20 2c 57 a5 97 9b 2d 8d 88 49 dc |...d. ,W...-..I.|
00000030 b8 ab 3b 90 b7 da bf 93 6c 23 a5 74 81 d9 11 e2 |..;.....l#.t....|
00000040 d9 11 49 5c fb 35 |..I\.5|
[7d8a 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7d8b 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cf560 gate 1582330583013876700 evaluation starts
[7d8c 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cf560 signed by 0 principal evaluation starts (used [false])
[7d8d 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cf560 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7d8e 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cf560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7d8f 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cf560 principal evaluation fails
[7d90 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cf560 gate 1582330583013876700 evaluation fails
[7d91 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7d92 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7d93 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7d94 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 32 5c e4 a7 8a 5c 09 e4 a0 3d fa 3e c7 9f 86 |.2\...\...=.>...|
00000010 66 fe 23 5d 7f 26 dc dc c5 e1 85 7a 6c 5f de a9 |f.#].&.....zl_..|
[7d95 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 47 df d8 a0 1f 15 19 d6 4a 50 2d |0D. .G.......JP-|
00000010 0a 52 f5 e9 72 70 24 fb f0 79 48 fb 51 15 bd 77 |.R..rp$..yH.Q..w|
00000020 e9 10 13 64 02 20 2c 57 a5 97 9b 2d 8d 88 49 dc |...d. ,W...-..I.|
00000030 b8 ab 3b 90 b7 da bf 93 6c 23 a5 74 81 d9 11 e2 |..;.....l#.t....|
00000040 d9 11 49 5c fb 35 |..I\.5|
[7d96 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7d97 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cff80 gate 1582330583014357300 evaluation starts
[7d98 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cff80 signed by 0 principal evaluation starts (used [false])
[7d99 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cff80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7d9a 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cff80 principal evaluation succeeds for identity 0
[7d9b 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cff80 gate 1582330583014357300 evaluation succeeds
[7d9c 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7d9d 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7d9e 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7d9f 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7da0 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[7da1 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[7da2 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7da3 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7da4 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7da5 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7da6 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7da7 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[7da8 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[7da9 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7daa 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003221350 gate 1582330583015383900 evaluation starts
[7dab 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003221350 signed by 0 principal evaluation starts (used [false])
[7dac 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003221350 processing identity 0 - &{Org1MSP 8be655ba89451b517544b2a241617d188129889401e79f0659d7ccb414b44486}
[7dad 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003221350 principal evaluation succeeds for identity 0
[7dae 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003221350 gate 1582330583015383900 evaluation succeeds
[7daf 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[7db0 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7db1 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7db2 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7db3 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 bb f9 b3 ae 00 00 35 24 2f dd 01 a1 9c da |........5$/.....|
00000010 b8 7f 78 86 f1 13 01 38 9e 43 2c 9a 0b 7f 81 7c |..x....8.C,....||
[7db4 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae ef 65 ca 50 56 7d 82 bf 1b 33 |0E.!...e.PV}...3|
00000010 82 6c c3 71 1b f1 c2 20 4b a1 36 7c 0d 4c ff 33 |.l.q... K.6|.L.3|
00000020 dd 20 f8 dc 1b 02 20 5d 61 08 72 e0 77 a4 af 78 |. .... ]a.r.w..x|
00000030 36 f3 f9 99 83 58 00 26 0e b3 e0 ce f7 5d e8 9b |6....X.&.....]..|
00000040 b3 e8 92 8b 7f 34 50 |.....4P|
[7db5 02-22 00:16:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7db6 02-22 00:16:23.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 841 bytes, Signature: 0 bytes
[7db7 02-22 00:16:23.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 841 bytes, Signature: 0 bytes
[7db8 02-22 00:16:23.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7db9 02-22 00:16:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 6e 27 8c c8 b2 3c 2c cc 15 2a 96 98 42 02 7b |"n'...<,..*..B.{|
00000010 73 18 8a 86 61 07 e2 28 52 07 94 a2 3f 16 ee 56 |s...a..(R...?..V|
[7dba 02-22 00:16:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 67 af c6 c6 62 a0 a7 88 b2 9f 7b |0D. sg...b.....{|
00000010 74 3e 02 ee 83 7b f2 09 11 8a 5c eb 61 d7 c6 ce |t>...{....\.a...|
00000020 c4 65 b6 b3 02 20 7c cd b4 c4 0a 24 70 71 65 35 |.e... |....$pqe5|
00000030 58 48 dc 59 53 5b a8 cd ee 61 b1 90 af 41 7b b9 |XH.YS[...a...A{.|
00000040 d1 78 f8 ad ce 6c |.x...l|
[7dbb 02-22 00:16:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7dbc 02-22 00:16:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7dbd 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7dbe 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7dbf 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7dc0 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7dc1 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7dc2 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7dc3 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 8e c8 12 f3 4c 7c 60 31 de e7 09 0e c5 1c e1 |.....L|`1.......|
00000010 da 7a ff 33 7f b4 71 08 ef 00 b0 e2 96 e8 9e 15 |.z.3..q.........|
[7dc4 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 4b c6 6f 0c cf 58 22 8c e4 a2 |0E.!..K.o..X"...|
00000010 c2 db b7 d4 2b 6e a3 3f 84 0a 33 8b 2c 09 5c eb |....+n.?..3.,.\.|
00000020 e8 67 f3 84 e7 02 20 34 81 2d 7e bb 9b 38 99 d8 |.g.... 4.-~..8..|
00000030 36 b9 82 56 b6 08 e7 0f 85 0b c7 13 74 c5 7c 5f |6..V........t.|_|
00000040 82 38 8b 40 8f c8 47 |.8.@..G|
[7dc5 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7dc6 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b01a0 gate 1582330583054395100 evaluation starts
[7dc7 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b01a0 signed by 0 principal evaluation starts (used [false])
[7dc8 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b01a0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7dc9 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b01a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7dca 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b01a0 principal evaluation fails
[7dcb 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b01a0 gate 1582330583054395100 evaluation fails
[7dcc 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7dcd 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7dce 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7dcf 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 8e c8 12 f3 4c 7c 60 31 de e7 09 0e c5 1c e1 |.....L|`1.......|
00000010 da 7a ff 33 7f b4 71 08 ef 00 b0 e2 96 e8 9e 15 |.z.3..q.........|
[7dd0 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 4b c6 6f 0c cf 58 22 8c e4 a2 |0E.!..K.o..X"...|
00000010 c2 db b7 d4 2b 6e a3 3f 84 0a 33 8b 2c 09 5c eb |....+n.?..3.,.\.|
00000020 e8 67 f3 84 e7 02 20 34 81 2d 7e bb 9b 38 99 d8 |.g.... 4.-~..8..|
00000030 36 b9 82 56 b6 08 e7 0f 85 0b c7 13 74 c5 7c 5f |6..V........t.|_|
00000040 82 38 8b 40 8f c8 47 |.8.@..G|
[7dd1 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7dd2 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b0aa0 gate 1582330583054821000 evaluation starts
[7dd3 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b0aa0 signed by 0 principal evaluation starts (used [false])
[7dd4 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b0aa0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7dd5 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b0aa0 principal evaluation succeeds for identity 0
[7dd6 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b0aa0 gate 1582330583054821000 evaluation succeeds
[7dd7 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7dd8 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7dd9 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7dda 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7ddb 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ddc 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ddd 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7dde 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7ddf 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7de0 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7de1 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7de2 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7de3 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[7de4 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[7de5 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7de6 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032da530 gate 1582330583058126200 evaluation starts
[7de7 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032da530 signed by 0 principal evaluation starts (used [false])
[7de8 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032da530 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7de9 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032da530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7dea 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032da530 principal evaluation fails
[7deb 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032da530 gate 1582330583058126200 evaluation fails
[7dec 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7ded 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7dee 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7def 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[7df0 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[7df1 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7df2 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032daef0 gate 1582330583059420200 evaluation starts
[7df3 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032daef0 signed by 0 principal evaluation starts (used [false])
[7df4 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032daef0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7df5 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032daef0 principal evaluation succeeds for identity 0
[7df6 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032daef0 gate 1582330583059420200 evaluation succeeds
[7df7 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7df8 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7df9 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7dfa 02-22 00:16:23.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7dfb 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7dfc 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7dfd 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7dfe 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7dff 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7e00 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7e01 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[7e02 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[7e03 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7e04 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032dbc90 gate 1582330583061606800 evaluation starts
[7e05 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032dbc90 signed by 0 principal evaluation starts (used [false])
[7e06 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032dbc90 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7e07 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032dbc90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7e08 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032dbc90 principal evaluation fails
[7e09 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032dbc90 gate 1582330583061606800 evaluation fails
[7e0a 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7e0b 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7e0c 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7e0d 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[7e0e 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[7e0f 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7e10 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003306590 gate 1582330583063712400 evaluation starts
[7e11 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003306590 signed by 0 principal evaluation starts (used [false])
[7e12 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003306590 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7e13 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003306590 principal evaluation succeeds for identity 0
[7e14 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003306590 gate 1582330583063712400 evaluation succeeds
[7e15 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7e16 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7e17 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7e18 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7e19 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 bb f9 b3 ae 00 00 35 24 2f dd 01 a1 9c da |........5$/.....|
00000010 b8 7f 78 86 f1 13 01 38 9e 43 2c 9a 0b 7f 81 7c |..x....8.C,....||
[7e1a 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae ef 65 ca 50 56 7d 82 bf 1b 33 |0E.!...e.PV}...3|
00000010 82 6c c3 71 1b f1 c2 20 4b a1 36 7c 0d 4c ff 33 |.l.q... K.6|.L.3|
00000020 dd 20 f8 dc 1b 02 20 5d 61 08 72 e0 77 a4 af 78 |. .... ]a.r.w..x|
00000030 36 f3 f9 99 83 58 00 26 0e b3 e0 ce f7 5d e8 9b |6....X.&.....]..|
00000040 b3 e8 92 8b 7f 34 50 |.....4P|
[7e1b 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e1c 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 841 bytes, Signature: 0 bytes
[7e1d 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e1e 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 6e 27 8c c8 b2 3c 2c cc 15 2a 96 98 42 02 7b |"n'...<,..*..B.{|
00000010 73 18 8a 86 61 07 e2 28 52 07 94 a2 3f 16 ee 56 |s...a..(R...?..V|
[7e1f 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 67 af c6 c6 62 a0 a7 88 b2 9f 7b |0D. sg...b.....{|
00000010 74 3e 02 ee 83 7b f2 09 11 8a 5c eb 61 d7 c6 ce |t>...{....\.a...|
00000020 c4 65 b6 b3 02 20 7c cd b4 c4 0a 24 70 71 65 35 |.e... |....$pqe5|
00000030 58 48 dc 59 53 5b a8 cd ee 61 b1 90 af 41 7b b9 |XH.YS[...a...A{.|
00000040 d1 78 f8 ad ce 6c |.x...l|
[7e20 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e21 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e22 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7e23 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7e24 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7e25 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7e26 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7e27 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7e28 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 32 5c e4 a7 8a 5c 09 e4 a0 3d fa 3e c7 9f 86 |.2\...\...=.>...|
00000010 66 fe 23 5d 7f 26 dc dc c5 e1 85 7a 6c 5f de a9 |f.#].&.....zl_..|
[7e29 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 47 df d8 a0 1f 15 19 d6 4a 50 2d |0D. .G.......JP-|
00000010 0a 52 f5 e9 72 70 24 fb f0 79 48 fb 51 15 bd 77 |.R..rp$..yH.Q..w|
00000020 e9 10 13 64 02 20 2c 57 a5 97 9b 2d 8d 88 49 dc |...d. ,W...-..I.|
00000030 b8 ab 3b 90 b7 da bf 93 6c 23 a5 74 81 d9 11 e2 |..;.....l#.t....|
00000040 d9 11 49 5c fb 35 |..I\.5|
[7e2a 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7e2b 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323220 gate 1582330583069548200 evaluation starts
[7e2c 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323220 signed by 0 principal evaluation starts (used [false])
[7e2d 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323220 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7e2e 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7e2f 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323220 principal evaluation fails
[7e30 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323220 gate 1582330583069548200 evaluation fails
[7e31 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7e32 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7e33 02-22 00:16:23.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7e34 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 32 5c e4 a7 8a 5c 09 e4 a0 3d fa 3e c7 9f 86 |.2\...\...=.>...|
00000010 66 fe 23 5d 7f 26 dc dc c5 e1 85 7a 6c 5f de a9 |f.#].&.....zl_..|
[7e35 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 47 df d8 a0 1f 15 19 d6 4a 50 2d |0D. .G.......JP-|
00000010 0a 52 f5 e9 72 70 24 fb f0 79 48 fb 51 15 bd 77 |.R..rp$..yH.Q..w|
00000020 e9 10 13 64 02 20 2c 57 a5 97 9b 2d 8d 88 49 dc |...d. ,W...-..I.|
00000030 b8 ab 3b 90 b7 da bf 93 6c 23 a5 74 81 d9 11 e2 |..;.....l#.t....|
00000040 d9 11 49 5c fb 35 |..I\.5|
[7e36 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7e37 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323bc0 gate 1582330583070276200 evaluation starts
[7e38 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323bc0 signed by 0 principal evaluation starts (used [false])
[7e39 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323bc0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7e3a 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323bc0 principal evaluation succeeds for identity 0
[7e3b 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003323bc0 gate 1582330583070276200 evaluation succeeds
[7e3c 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7e3d 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7e3e 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7e3f 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7e40 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e41 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e42 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7e43 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7e44 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7e45 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7e46 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7e47 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7e48 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[7e49 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[7e4a 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7e4b 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e97b0 gate 1582330583076120000 evaluation starts
[7e4c 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e97b0 signed by 0 principal evaluation starts (used [false])
[7e4d 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e97b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7e4e 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e97b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7e4f 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e97b0 principal evaluation fails
[7e50 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e97b0 gate 1582330583076120000 evaluation fails
[7e51 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7e52 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7e53 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7e54 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[7e55 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[7e56 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7e57 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034040b0 gate 1582330583076538300 evaluation starts
[7e58 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034040b0 signed by 0 principal evaluation starts (used [false])
[7e59 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034040b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7e5a 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034040b0 principal evaluation succeeds for identity 0
[7e5b 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034040b0 gate 1582330583076538300 evaluation succeeds
[7e5c 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7e5d 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7e5e 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7e5f 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7e60 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e61 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7e62 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7e63 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7e64 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7e65 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7e66 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[7e67 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[7e68 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7e69 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404ef0 gate 1582330583077178300 evaluation starts
[7e6a 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404ef0 signed by 0 principal evaluation starts (used [false])
[7e6b 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404ef0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7e6c 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7e6d 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404ef0 principal evaluation fails
[7e6e 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404ef0 gate 1582330583077178300 evaluation fails
[7e6f 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7e70 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7e71 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7e72 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[7e73 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[7e74 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7e75 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034057f0 gate 1582330583077706000 evaluation starts
[7e76 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034057f0 signed by 0 principal evaluation starts (used [false])
[7e77 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034057f0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7e78 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034057f0 principal evaluation succeeds for identity 0
[7e79 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034057f0 gate 1582330583077706000 evaluation succeeds
[7e7a 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7e7b 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7e7c 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7e7d 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7e7e 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 bb f9 b3 ae 00 00 35 24 2f dd 01 a1 9c da |........5$/.....|
00000010 b8 7f 78 86 f1 13 01 38 9e 43 2c 9a 0b 7f 81 7c |..x....8.C,....||
[7e7f 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae ef 65 ca 50 56 7d 82 bf 1b 33 |0E.!...e.PV}...3|
00000010 82 6c c3 71 1b f1 c2 20 4b a1 36 7c 0d 4c ff 33 |.l.q... K.6|.L.3|
00000020 dd 20 f8 dc 1b 02 20 5d 61 08 72 e0 77 a4 af 78 |. .... ]a.r.w..x|
00000030 36 f3 f9 99 83 58 00 26 0e b3 e0 ce f7 5d e8 9b |6....X.&.....]..|
00000040 b3 e8 92 8b 7f 34 50 |.....4P|
[7e80 02-22 00:16:23.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e81 02-22 00:16:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e82 02-22 00:16:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e83 02-22 00:16:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[7e84 02-22 00:16:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e85 02-22 00:16:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7e86 02-22 00:16:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4981734578339753875 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[7e87 02-22 00:16:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:4981734578339753875 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[7e88 02-22 00:16:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4981734578339753875 , Msg_type: BLOCK_MSG, digests: [5 6 7 8 1 2 3 4], Envelope: 57 bytes, Signature: 0 bytes
[7e89 02-22 00:16:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e8a 02-22 00:16:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4981734578339753875 , Msg_type: BLOCK_MSG, digests: [5 6 7 8 1 2 3 4], Envelope: 57 bytes, Signature: 0 bytes
[7e8b 02-22 00:16:23.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7e8c 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:45016
[7e8d 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel=businesschannel txID=6bcf6fd0 mspID=Org1MSP
[7e8e 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 10 36 1a 57 3f 34 06 27 da 4e 89 a0 4b d0 c9 |..6.W?4.'.N..K..|
00000010 a0 e5 ec 98 12 58 1b 77 4d 4e 78 f7 9b e9 83 3a |.....X.wMNx....:|
[7e8f 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 36 10 f0 8b 82 78 27 db 3c 6d e5 |0D. 06....x'.<m.|
00000010 86 7c 60 48 db c6 40 66 6d 0a 08 fc 1e 73 b8 33 |.|`H..@fm....s.3|
00000020 8b e9 47 5e 02 20 5c b0 89 fb cf b6 63 dd 24 18 |..G^. \.....c.$.|
00000030 ef e5 cc 99 42 86 5f 5d a5 7f fa 69 3f 4c 25 16 |....B._]...i?L%.|
00000040 29 e9 59 88 85 a9 |).Y...|
[7e90 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel=businesschannel txID=6bcf6fd0 mspID=Org1MSP
[7e91 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [6bcf6fd044f4353e8662ded3497252ee8021eb66807da8e339aabb5a98e254f4]
[7e92 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x36, 0x62, 0x63, 0x66, 0x36, 0x66, 0x64, 0x30, 0x34, 0x34, 0x66, 0x34, 0x33, 0x35, 0x33, 0x65, 0x38, 0x36, 0x36, 0x32, 0x64, 0x65, 0x64, 0x33, 0x34, 0x39, 0x37, 0x32, 0x35, 0x32, 0x65, 0x65, 0x38, 0x30, 0x32, 0x31, 0x65, 0x62, 0x36, 0x36, 0x38, 0x30, 0x37, 0x64, 0x61, 0x38, 0x65, 0x33, 0x33, 0x39, 0x61, 0x61, 0x62, 0x62, 0x35, 0x61, 0x39, 0x38, 0x65, 0x32, 0x35, 0x34, 0x66, 0x34}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x36, 0x62, 0x63, 0x66, 0x36, 0x66, 0x64, 0x30, 0x34, 0x34, 0x66, 0x34, 0x33, 0x35, 0x33, 0x65, 0x38, 0x36, 0x36, 0x32, 0x64, 0x65, 0x64, 0x33, 0x34, 0x39, 0x37, 0x32, 0x35, 0x32, 0x65, 0x65, 0x38, 0x30, 0x32, 0x31, 0x65, 0x62, 0x36, 0x36, 0x38, 0x30, 0x37, 0x64, 0x61, 0x38, 0x65, 0x33, 0x33, 0x39, 0x61, 0x61, 0x62, 0x62, 0x35, 0x61, 0x39, 0x38, 0x65, 0x32, 0x35, 0x34, 0x66, 0x34, 0xff}]
[7e93 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU [6bcf6fd0] getting chaincode data for cscc on channel businesschannel
[7e94 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[7e95 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetConfigBlock
[7e96 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock
[7e97 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers)
[7e98 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7e99 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7e9a 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7e9b 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 10 36 1a 57 3f 34 06 27 da 4e 89 a0 4b d0 c9 |..6.W?4.'.N..K..|
00000010 a0 e5 ec 98 12 58 1b 77 4d 4e 78 f7 9b e9 83 3a |.....X.wMNx....:|
[7e9c 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 36 10 f0 8b 82 78 27 db 3c 6d e5 |0D. 06....x'.<m.|
00000010 86 7c 60 48 db c6 40 66 6d 0a 08 fc 1e 73 b8 33 |.|`H..@fm....s.3|
00000020 8b e9 47 5e 02 20 5c b0 89 fb cf b6 63 dd 24 18 |..G^. \.....c.$.|
00000030 ef e5 cc 99 42 86 5f 5d a5 7f fa 69 3f 4c 25 16 |....B._]...i?L%.|
00000040 29 e9 59 88 85 a9 |).Y...|
[7e9d 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7e9e 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540490 gate 1582330583245103900 evaluation starts
[7e9f 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540490 signed by 0 principal evaluation starts (used [false])
[7ea0 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540490 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[7ea1 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540490 principal evaluation succeeds for identity 0
[7ea2 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540490 gate 1582330583245103900 evaluation succeeds
[7ea3 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[7ea4 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7ea5 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7ea6 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7ea7 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Getting config block
[7ea8 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveBlockByNumber() - blockNum = [8]
[7ea9 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[101579]
[7eaa 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[4067], Going to peek [8] bytes
[7eab 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[4065], placementInfo={fileNum=[0], startOffset=[101579], bytesOffset=[101581]}
[7eac 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveBlockByNumber() - blockNum = [2]
[7ead 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[52127]
[7eae 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[53519], Going to peek [8] bytes
[7eaf 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[26007], placementInfo={fileNum=[0], startOffset=[52127], bytesOffset=[52130]}
[7eb0 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got config block[2]
[7eb1 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU [6bcf6fd0] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[7eb2 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU [6bcf6fd0] notifying Txid:6bcf6fd044f4353e8662ded3497252ee8021eb66807da8e339aabb5a98e254f4, channelID:businesschannel
[7eb3 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[7eb4 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: cscc duration: 5ms channel=businesschannel txID=6bcf6fd0
[7eb5 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU escc for chaincode cscc is escc channel=businesschannel txID=6bcf6fd0
[7eb6 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A203548775DDE50F65D67586E20DED7...455254494649434154452D2D2D2D2D0A
[7eb7 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6055076C7C5A1FC2F0C4DAC8901FA9515E3E6B5DB861055583F13BBA3B08FB99
[7eb8 02-22 00:16:23.24 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45016 grpc.code=OK grpc.call_duration=8.8028ms
[7eb9 02-22 00:16:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7eba 02-22 00:16:23.25 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7ebb 02-22 00:16:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:45020
[7ebc 02-22 00:16:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel=businesschannel txID=8e7d1bf6 mspID=Org1MSP
[7ebd 02-22 00:16:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 e5 aa 7f b3 8b 95 e6 fb cc cf 61 a4 14 6e 6d |...........a..nm|
00000010 ce 58 df 05 90 4e d4 a6 fe 1c af 36 24 9a d9 73 |.X...N.....6$..s|
[7ebe 02-22 00:16:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e 0a c6 76 84 9f 42 1e 71 b3 5b 0d |0D. ^..v..B.q.[.|
00000010 53 a0 0e 7d aa 70 4c 82 15 ac 5b 7c 72 1e 12 07 |S..}.pL...[|r...|
00000020 8b 51 7d 5a 02 20 61 5d 47 08 d4 b0 89 1c 09 41 |.Q}Z. a]G......A|
00000030 6b 42 29 19 04 ff 36 38 5e 84 e6 8d 9a e8 55 8f |kB)...68^.....U.|
00000040 c6 fe bb 29 3c 38 |...)<8|
[7ebf 02-22 00:16:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel=businesschannel txID=8e7d1bf6 mspID=Org1MSP
[7ec0 02-22 00:16:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [8e7d1bf621439c7ce2cd34a63fd6ffbcde4671a033f13745cd6b5d8f51ef41b4]
[7ec1 02-22 00:16:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x38, 0x65, 0x37, 0x64, 0x31, 0x62, 0x66, 0x36, 0x32, 0x31, 0x34, 0x33, 0x39, 0x63, 0x37, 0x63, 0x65, 0x32, 0x63, 0x64, 0x33, 0x34, 0x61, 0x36, 0x33, 0x66, 0x64, 0x36, 0x66, 0x66, 0x62, 0x63, 0x64, 0x65, 0x34, 0x36, 0x37, 0x31, 0x61, 0x30, 0x33, 0x33, 0x66, 0x31, 0x33, 0x37, 0x34, 0x35, 0x63, 0x64, 0x36, 0x62, 0x35, 0x64, 0x38, 0x66, 0x35, 0x31, 0x65, 0x66, 0x34, 0x31, 0x62, 0x34}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x74, 0x1, 0x40, 0x38, 0x65, 0x37, 0x64, 0x31, 0x62, 0x66, 0x36, 0x32, 0x31, 0x34, 0x33, 0x39, 0x63, 0x37, 0x63, 0x65, 0x32, 0x63, 0x64, 0x33, 0x34, 0x61, 0x36, 0x33, 0x66, 0x64, 0x36, 0x66, 0x66, 0x62, 0x63, 0x64, 0x65, 0x34, 0x36, 0x37, 0x31, 0x61, 0x30, 0x33, 0x33, 0x66, 0x31, 0x33, 0x37, 0x34, 0x35, 0x63, 0x64, 0x36, 0x62, 0x35, 0x64, 0x38, 0x66, 0x35, 0x31, 0x65, 0x66, 0x34, 0x31, 0x62, 0x34, 0xff}]
[7ec2 02-22 00:16:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU [8e7d1bf6] getting chaincode data for cscc on channel businesschannel
[7ec3 02-22 00:16:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[7ec4 02-22 00:16:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels
[7ec5 02-22 00:16:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 e5 aa 7f b3 8b 95 e6 fb cc cf 61 a4 14 6e 6d |...........a..nm|
00000010 ce 58 df 05 90 4e d4 a6 fe 1c af 36 24 9a d9 73 |.X...N.....6$..s|
[7ec6 02-22 00:16:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e 0a c6 76 84 9f 42 1e 71 b3 5b 0d |0D. ^..v..B.q.[.|
00000010 53 a0 0e 7d aa 70 4c 82 15 ac 5b 7c 72 1e 12 07 |S..}.pL...[|r...|
00000020 8b 51 7d 5a 02 20 61 5d 47 08 d4 b0 89 1c 09 41 |.Q}Z. a]G......A|
00000030 6b 42 29 19 04 ff 36 38 5e 84 e6 8d 9a e8 55 8f |kB)...68^.....U.|
00000040 c6 fe bb 29 3c 38 |...)<8|
[7ec7 02-22 00:16:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU [8e7d1bf6] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[7ec8 02-22 00:16:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU [8e7d1bf6] notifying Txid:8e7d1bf621439c7ce2cd34a63fd6ffbcde4671a033f13745cd6b5d8f51ef41b4, channelID:businesschannel
[7ec9 02-22 00:16:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[7eca 02-22 00:16:23.44 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: cscc duration: 1ms channel=businesschannel txID=8e7d1bf6
[7ecb 02-22 00:16:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU escc for chaincode cscc is escc channel=businesschannel txID=8e7d1bf6
[7ecc 02-22 00:16:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2052EC39CCC30E349106CC20DDC854...455254494649434154452D2D2D2D2D0A
[7ecd 02-22 00:16:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D73016993FC6C3F1005A38A994B4959DD0B41C6B4B40D4680D7ED23B090581D9
[7ece 02-22 00:16:23.44 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45020 grpc.code=OK grpc.call_duration=4.3608ms
[7ecf 02-22 00:16:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:45020: read: connection reset by peer
[7ed0 02-22 00:16:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7ed1 02-22 00:16:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[7ed2 02-22 00:16:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[7ed3 02-22 00:16:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ed4 02-22 00:16:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ed5 02-22 00:16:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ed6 02-22 00:16:23.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330581522990100 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7ed7 02-22 00:16:23.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[7ed8 02-22 00:16:23.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[7ed9 02-22 00:16:23.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7eda 02-22 00:16:23.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330581522990100 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7edb 02-22 00:16:23.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330581522990100 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7edc 02-22 00:16:23.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[7edd 02-22 00:16:23.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[7ede 02-22 00:16:23.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7edf 02-22 00:16:23.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ee0 02-22 00:16:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330581522990100 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7ee1 02-22 00:16:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[7ee2 02-22 00:16:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[7ee3 02-22 00:16:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ee4 02-22 00:16:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ee5 02-22 00:16:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16854808848466243755 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[7ee6 02-22 00:16:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:16854808848466243755 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[7ee7 02-22 00:16:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6 7 8] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[7ee8 02-22 00:16:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7ee9 02-22 00:16:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[7eea 02-22 00:16:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7eeb 02-22 00:16:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7eec 02-22 00:16:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7eed 02-22 00:16:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7eee 02-22 00:16:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330581531849700 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7eef 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7ef0 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7ef1 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7ef2 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7ef3 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7ef4 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7ef5 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7ef6 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[7ef7 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[7ef8 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330581531849700 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7ef9 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7efa 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036de360 gate 1582330583924247000 evaluation starts
[7efb 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036de360 signed by 0 principal evaluation starts (used [false])
[7efc 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036de360 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7efd 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036de360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7efe 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036de360 principal evaluation fails
[7eff 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036de360 gate 1582330583924247000 evaluation fails
[7f00 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7f01 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7f02 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7f03 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[7f04 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[7f05 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7f06 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d1e0 gate 1582330583925716500 evaluation starts
[7f07 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d1e0 signed by 0 principal evaluation starts (used [false])
[7f08 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d1e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7f09 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d1e0 principal evaluation succeeds for identity 0
[7f0a 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362d1e0 gate 1582330583925716500 evaluation succeeds
[7f0b 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7f0c 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7f0d 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7f0e 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7f0f 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f10 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f11 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330581531849700 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[7f12 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f13 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7f14 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7f15 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7f16 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7f17 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7f18 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7f19 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[7f1a 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[7f1b 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7f1c 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728e20 gate 1582330583928369900 evaluation starts
[7f1d 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728e20 signed by 0 principal evaluation starts (used [false])
[7f1e 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728e20 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7f1f 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7f20 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728e20 principal evaluation fails
[7f21 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003728e20 gate 1582330583928369900 evaluation fails
[7f22 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7f23 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7f24 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7f25 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[7f26 02-22 00:16:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[7f27 02-22 00:16:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7f28 02-22 00:16:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729720 gate 1582330583930490000 evaluation starts
[7f29 02-22 00:16:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729720 signed by 0 principal evaluation starts (used [false])
[7f2a 02-22 00:16:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729720 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7f2b 02-22 00:16:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729720 principal evaluation succeeds for identity 0
[7f2c 02-22 00:16:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003729720 gate 1582330583930490000 evaluation succeeds
[7f2d 02-22 00:16:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7f2e 02-22 00:16:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7f2f 02-22 00:16:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7f30 02-22 00:16:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7f31 02-22 00:16:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f32 02-22 00:16:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f33 02-22 00:16:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[7f34 02-22 00:16:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[7f35 02-22 00:16:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f36 02-22 00:16:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f37 02-22 00:16:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f38 02-22 00:16:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f39 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424343087800 seq_num:1582330581499374600 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[7f3a 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424343087800 seq_num:1582330581499374600 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7 properties:ledger_height:9 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[7f3b 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f3c 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7f3d 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7f3e 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7f3f 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7f40 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7f41 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7f42 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[7f43 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[7f44 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7f45 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dfb40 gate 1582330584199478200 evaluation starts
[7f46 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dfb40 signed by 0 principal evaluation starts (used [false])
[7f47 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dfb40 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7f48 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dfb40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7f49 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dfb40 principal evaluation fails
[7f4a 02-22 00:16:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dfb40 gate 1582330584199478200 evaluation fails
[7f4b 02-22 00:16:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7f4c 02-22 00:16:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7f4d 02-22 00:16:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7f4e 02-22 00:16:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[7f4f 02-22 00:16:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[7f50 02-22 00:16:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7f51 02-22 00:16:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792440 gate 1582330584201353800 evaluation starts
[7f52 02-22 00:16:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792440 signed by 0 principal evaluation starts (used [false])
[7f53 02-22 00:16:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792440 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7f54 02-22 00:16:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792440 principal evaluation succeeds for identity 0
[7f55 02-22 00:16:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792440 gate 1582330584201353800 evaluation succeeds
[7f56 02-22 00:16:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7f57 02-22 00:16:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7f58 02-22 00:16:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7f59 02-22 00:16:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7f5a 02-22 00:16:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f5b 02-22 00:16:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f5c 02-22 00:16:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7f5d 02-22 00:16:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f5e 02-22 00:16:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7f5f 02-22 00:16:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[7f60 02-22 00:16:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 98 c7 e3 1e 96 bb ac ef 6d 17 3d 54 c6 95 a7 |.........m.=T...|
00000010 1d b9 84 e6 16 af ac f4 5b da 87 0b ce 46 03 c0 |........[....F..|
[7f61 02-22 00:16:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 5b ba 5d f4 dc d9 67 f7 64 8b |0E.!..[.]...g.d.|
00000010 b6 1a e0 70 96 57 fa d1 d7 5a e6 4f 51 a8 ab 00 |...p.W...Z.OQ...|
00000020 96 2c dc cd 2b 02 20 34 bc 29 df a9 44 1a d4 b6 |.,..+. 4.)..D...|
00000030 51 15 25 73 b7 9a 7c c6 24 bd df 1b f9 6a f4 b2 |Q.%s..|.$....j..|
00000040 5f 60 8e e4 91 4c e0 |_`...L.|
[7f62 02-22 00:16:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[7f63 02-22 00:16:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 2c 17 e5 95 c7 8e 0d 1f d9 88 |0E.!..,.........|
00000010 e6 e0 f3 ab fe 2a 43 22 c2 21 e9 80 c4 43 00 ad |.....*C".!...C..|
00000020 cd 23 e0 89 1e 02 20 71 7e cb 50 8c f6 0e 3a 43 |.#.... q~.P...:C|
00000030 e4 16 e0 12 bc 9b 6a 01 c6 1a da f7 b5 68 43 f3 |......j......hC.|
00000040 31 ee d3 15 96 40 9f |1....@.|
[7f64 02-22 00:16:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[7f65 02-22 00:16:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[7f66 02-22 00:16:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:90
[7f67 02-22 00:16:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:90
[7f68 02-22 00:16:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[7f69 02-22 00:16:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f6a 02-22 00:16:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f6b 02-22 00:16:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f6c 02-22 00:16:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f6d 02-22 00:16:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f6e 02-22 00:16:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f6f 02-22 00:16:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[7f70 02-22 00:16:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f71 02-22 00:16:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[7f72 02-22 00:16:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes
[7f73 02-22 00:16:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f74 02-22 00:16:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes
[7f75 02-22 00:16:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f76 02-22 00:16:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes
[7f77 02-22 00:16:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f78 02-22 00:16:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes
[7f79 02-22 00:16:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f7a 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[7f7b 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[7f7c 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7f7d 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[7f7e 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[7f7f 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7f80 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7f81 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7f82 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7f83 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7f84 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7f85 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7f86 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 8d f0 13 e7 40 40 76 81 91 35 ec 3d 77 ed 64 |.....@@v..5.=w.d|
00000010 b7 41 fd f2 4b 83 42 4f 7d 8a e1 81 44 ec 0e 37 |.A..K.BO}...D..7|
[7f87 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 80 4c 33 a6 52 bb 0c a2 66 21 |0E.!...L3.R...f!|
00000010 02 3e cf b8 3f 5e d3 5d 45 3c cf fd 47 af be a5 |.>..?^.]E<..G...|
00000020 f8 c2 2c c2 ac 02 20 15 d7 b9 31 8b 50 4d d5 10 |..,... ...1.PM..|
00000030 a6 3b 36 f3 18 2e 10 11 e7 22 5f c6 eb 68 d8 e6 |.;6......"_..h..|
00000040 74 3f 91 5c ba 4d 73 |t?.\.Ms|
[7f88 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7f89 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389cc10 gate 1582330584277071800 evaluation starts
[7f8a 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389cc10 signed by 0 principal evaluation starts (used [false])
[7f8b 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389cc10 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7f8c 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389cc10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7f8d 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389cc10 principal evaluation fails
[7f8e 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389cc10 gate 1582330584277071800 evaluation fails
[7f8f 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7f90 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7f91 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7f92 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 8d f0 13 e7 40 40 76 81 91 35 ec 3d 77 ed 64 |.....@@v..5.=w.d|
00000010 b7 41 fd f2 4b 83 42 4f 7d 8a e1 81 44 ec 0e 37 |.A..K.BO}...D..7|
[7f93 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 80 4c 33 a6 52 bb 0c a2 66 21 |0E.!...L3.R...f!|
00000010 02 3e cf b8 3f 5e d3 5d 45 3c cf fd 47 af be a5 |.>..?^.]E<..G...|
00000020 f8 c2 2c c2 ac 02 20 15 d7 b9 31 8b 50 4d d5 10 |..,... ...1.PM..|
00000030 a6 3b 36 f3 18 2e 10 11 e7 22 5f c6 eb 68 d8 e6 |.;6......"_..h..|
00000040 74 3f 91 5c ba 4d 73 |t?.\.Ms|
[7f94 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7f95 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d680 gate 1582330584277489500 evaluation starts
[7f96 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d680 signed by 0 principal evaluation starts (used [false])
[7f97 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d680 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[7f98 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d680 principal evaluation succeeds for identity 0
[7f99 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389d680 gate 1582330584277489500 evaluation succeeds
[7f9a 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7f9b 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7f9c 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7f9d 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7f9e 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[7f9f 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes]}
[7fa0 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:89
[7fa1 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:89
[7fa2 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:88 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[7fa3 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fa4 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fa5 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fa6 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fa7 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fa8 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fa9 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7faa 02-22 00:16:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fab 02-22 00:16:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fac 02-22 00:16:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[7fad 02-22 00:16:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fae 02-22 00:16:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7faf 02-22 00:16:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[7fb0 02-22 00:16:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[7fb1 02-22 00:16:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fb2 02-22 00:16:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[7fb3 02-22 00:16:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fb4 02-22 00:16:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[7fb5 02-22 00:16:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[7fb6 02-22 00:16:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510211801
[7fb7 02-22 00:16:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 094BB52AB6B352DDA387BDA819E8FC14B5502E098AF2231CD150F27DD4AA0727
[7fb8 02-22 00:16:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[7fb9 02-22 00:16:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fba 02-22 00:16:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fbb 02-22 00:16:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fbc 02-22 00:16:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fbd 02-22 00:16:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:33 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[7fbe 02-22 00:16:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fbf 02-22 00:16:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fc0 02-22 00:16:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:33 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[7fc1 02-22 00:16:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fc2 02-22 00:16:24.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes
[7fc3 02-22 00:16:24.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes
[7fc4 02-22 00:16:24.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fc5 02-22 00:16:24.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes
[7fc6 02-22 00:16:24.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fc7 02-22 00:16:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151056
[7fc8 02-22 00:16:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3E30165682E6864623B96CF8DD0FB76CEC9F16F2B3C1B37DA07628851DE4D57D
[7fc9 02-22 00:16:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[7fca 02-22 00:16:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[7fcb 02-22 00:16:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[7fcc 02-22 00:16:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fcd 02-22 00:16:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fce 02-22 00:16:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fcf 02-22 00:16:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[7fd0 02-22 00:16:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fd1 02-22 00:16:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[7fd2 02-22 00:16:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[7fd3 02-22 00:16:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes
[7fd5 02-22 00:16:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fd4 02-22 00:16:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes
[7fd6 02-22 00:16:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fd7 02-22 00:16:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:86 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[7fd8 02-22 00:16:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fd9 02-22 00:16:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7fda 02-22 00:16:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[7fdb 02-22 00:16:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7fdc 02-22 00:16:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[7fdd 02-22 00:16:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[7fde 02-22 00:16:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[7fdf 02-22 00:16:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[7fe0 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[7fe1 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[7fe2 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[7fe3 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[7fe4 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc 1d 59 0d 9c d1 1e 2d 0b 13 b9 bd 28 c5 b4 9a |..Y....-....(...|
00000010 4f 54 9e 29 b6 6a 4a 48 b0 a8 42 b5 49 c1 b3 bb |OT.).jJH..B.I...|
[7fe5 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 ca fe 6d fd 8a c3 ad 2e 3e a3 ac |0D. t..m.....>..|
00000010 18 41 73 13 da 9e 93 20 bc 96 97 c3 ac 54 cf 98 |.As.... .....T..|
00000020 61 5f dc 1b 02 20 56 54 8f 6a f3 95 e1 28 15 d5 |a_... VT.j...(..|
00000030 10 b5 48 cc f5 d8 8e af 9f 1e e6 75 e2 d0 cb d0 |..H........u....|
00000040 1c b1 12 a2 8c 75 |.....u|
[7fe6 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7fe7 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998b60 gate 1582330585170779400 evaluation starts
[7fe8 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998b60 signed by 0 principal evaluation starts (used [false])
[7fe9 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998b60 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7fea 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[7feb 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998b60 principal evaluation fails
[7fec 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998b60 gate 1582330585170779400 evaluation fails
[7fed 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[7fee 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[7fef 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[7ff0 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc 1d 59 0d 9c d1 1e 2d 0b 13 b9 bd 28 c5 b4 9a |..Y....-....(...|
00000010 4f 54 9e 29 b6 6a 4a 48 b0 a8 42 b5 49 c1 b3 bb |OT.).jJH..B.I...|
[7ff1 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 ca fe 6d fd 8a c3 ad 2e 3e a3 ac |0D. t..m.....>..|
00000010 18 41 73 13 da 9e 93 20 bc 96 97 c3 ac 54 cf 98 |.As.... .....T..|
00000020 61 5f dc 1b 02 20 56 54 8f 6a f3 95 e1 28 15 d5 |a_... VT.j...(..|
00000030 10 b5 48 cc f5 d8 8e af 9f 1e e6 75 e2 d0 cb d0 |..H........u....|
00000040 1c b1 12 a2 8c 75 |.....u|
[7ff2 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[7ff3 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003999580 gate 1582330585172189700 evaluation starts
[7ff4 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003999580 signed by 0 principal evaluation starts (used [false])
[7ff5 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003999580 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[7ff6 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003999580 principal evaluation succeeds for identity 0
[7ff8 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7ff9 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7ff7 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003999580 gate 1582330585172189700 evaluation succeeds
[7ffa 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[7ffb 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[7ffc 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[7ffd 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[7ffe 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[7fff 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes]}
[8000 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:87
[8001 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:87
[8002 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:86 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[8003 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8004 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8005 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8006 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[8007 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8008 02-22 00:16:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8009 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[800a 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[800b 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[800c 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[800d 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[800e 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[800f 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8010 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8011 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8012 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8013 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[8014 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8015 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8016 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[8017 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[8018 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[8019 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[801a 02-22 00:16:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[801b 02-22 00:16:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:13801199550200636841 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[801c 02-22 00:16:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13801199550200636841 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[801d 02-22 00:16:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[801e 02-22 00:16:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[801f 02-22 00:16:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8020 02-22 00:16:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8021 02-22 00:16:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8022 02-22 00:16:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8023 02-22 00:16:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[8024 02-22 00:16:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8025 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[8026 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8027 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[8028 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[8029 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 8e 6e 3d 53 f6 d9 2a b0 8f c8 92 c3 b2 79 68 |C.n=S..*......yh|
00000010 7e 71 7a ed d9 c2 47 c4 7e 45 bc d3 cb 29 1e 26 |~qz...G.~E...).&|
[802a 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 0f 37 c9 f0 be 30 6a ae 32 c5 1d |0D. (.7...0j.2..|
00000010 86 0f 5f 93 1f 15 9e 8c e5 d2 9b e7 4a d3 aa 75 |.._.........J..u|
00000020 a8 16 09 16 02 20 4e 60 f3 c9 d4 3f cd f8 97 72 |..... N`...?...r|
00000030 7a 64 71 a0 4a 08 22 97 48 65 88 a8 1f 79 3f 18 |zdq.J.".He...y?.|
00000040 d2 ec 75 84 ca 09 |..u...|
[802b 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[802c 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce 89 da 23 0b 6b cf d1 ac cc 93 |0E.!....#.k.....|
00000010 bb e5 0c 56 ec 2b 02 d2 9d 2d 8b 7a 8e ac 3f df |...V.+...-.z..?.|
00000020 e2 bf 81 2c 26 02 20 7f 5f bf 9a 09 dc 13 4b 8b |...,&. ._.....K.|
00000030 2a e3 55 eb 98 e9 f2 48 f8 15 46 c7 81 72 a6 50 |*.U....H..F..r.P|
00000040 30 e1 e1 07 8e d5 11 |0......|
[802d 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[802e 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[802f 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:91
[8030 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:91
[8031 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:90 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[8032 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8033 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8034 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8035 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[8036 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8037 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8038 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[8039 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[803a 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[803b 02-22 00:16:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[803c 02-22 00:16:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:1265906599812351513 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[803d 02-22 00:16:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1265906599812351513 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[803e 02-22 00:16:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[803f 02-22 00:16:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8040 02-22 00:16:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:17673038485086202249 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8041 02-22 00:16:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:17673038485086202249 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8042 02-22 00:16:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:17673038485086202249 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8043 02-22 00:16:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8044 02-22 00:16:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8045 02-22 00:16:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8046 02-22 00:16:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8047 02-22 00:16:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8048 02-22 00:16:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8049 02-22 00:16:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[804a 02-22 00:16:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[804b 02-22 00:16:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[804c 02-22 00:16:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:16064233984828541273 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[804d 02-22 00:16:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[804e 02-22 00:16:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:15652407856772265377 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[804f 02-22 00:16:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[8050 02-22 00:16:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:5939222229908306516 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[8051 02-22 00:16:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:5939222229908306516 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8052 02-22 00:16:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8053 02-22 00:16:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:16064233984828541273 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8054 02-22 00:16:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8055 02-22 00:16:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:15652407856772265377 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8056 02-22 00:16:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8057 02-22 00:16:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16064233984828541273 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[8058 02-22 00:16:26.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16064233984828541273 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[8059 02-22 00:16:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16064233984828541273 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[805a 02-22 00:16:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[805b 02-22 00:16:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5939222229908306516 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[805c 02-22 00:16:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5939222229908306516 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[805d 02-22 00:16:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[805e 02-22 00:16:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15652407856772265377 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[805f 02-22 00:16:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15652407856772265377 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[8060 02-22 00:16:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8061 02-22 00:16:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8062 02-22 00:16:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8063 02-22 00:16:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8064 02-22 00:16:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8065 02-22 00:16:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[8066 02-22 00:16:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8067 02-22 00:16:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8068 02-22 00:16:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8069 02-22 00:16:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[806a 02-22 00:16:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[806b 02-22 00:16:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[806c 02-22 00:16:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[806d 02-22 00:16:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 40 57 6c 5a ba 75 0e 91 23 4b e0 79 95 6e 5c 0c |@WlZ.u..#K.y.n\.|
00000010 a9 cd 82 9d b9 f1 58 f7 5f b4 53 09 3f 05 19 e1 |......X._.S.?...|
[806e 02-22 00:16:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 5d 5e 66 f0 a6 4d 6f 16 37 88 c8 |0D. G]^f..Mo.7..|
00000010 96 06 75 28 f7 d8 7f 88 02 26 db 80 a9 c3 e9 89 |..u(.....&......|
00000020 39 ae 1b af 02 20 1d 01 e5 ea d0 2b e0 60 77 fe |9.... .....+.`w.|
00000030 bb c8 7c 65 4e 75 26 02 83 50 fb 57 81 40 26 2e |..|eNu&..P.W.@&.|
00000040 c0 a3 7d 3d 51 13 |..}=Q.|
[806f 02-22 00:16:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8070 02-22 00:16:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af5840 gate 1582330586494657800 evaluation starts
[8071 02-22 00:16:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af5840 signed by 0 principal evaluation starts (used [false])
[8072 02-22 00:16:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af5840 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8073 02-22 00:16:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af5840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8074 02-22 00:16:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af5840 principal evaluation fails
[8075 02-22 00:16:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af5840 gate 1582330586494657800 evaluation fails
[8076 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8077 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8078 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8079 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 40 57 6c 5a ba 75 0e 91 23 4b e0 79 95 6e 5c 0c |@WlZ.u..#K.y.n\.|
00000010 a9 cd 82 9d b9 f1 58 f7 5f b4 53 09 3f 05 19 e1 |......X._.S.?...|
[807a 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 5d 5e 66 f0 a6 4d 6f 16 37 88 c8 |0D. G]^f..Mo.7..|
00000010 96 06 75 28 f7 d8 7f 88 02 26 db 80 a9 c3 e9 89 |..u(.....&......|
00000020 39 ae 1b af 02 20 1d 01 e5 ea d0 2b e0 60 77 fe |9.... .....+.`w.|
00000030 bb c8 7c 65 4e 75 26 02 83 50 fb 57 81 40 26 2e |..|eNu&..P.W.@&.|
00000040 c0 a3 7d 3d 51 13 |..}=Q.|
[807b 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[807c 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02140 gate 1582330586504402600 evaluation starts
[807d 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02140 signed by 0 principal evaluation starts (used [false])
[807e 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02140 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[807f 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02140 principal evaluation succeeds for identity 0
[8080 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02140 gate 1582330586504402600 evaluation succeeds
[8081 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8082 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8083 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8084 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8085 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes
[8086 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes]}
[8087 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:90
[8088 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:90
[8089 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[808a 02-22 00:16:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[808b 02-22 00:16:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[808c 02-22 00:16:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[808d 02-22 00:16:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[808e 02-22 00:16:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[808f 02-22 00:16:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8090 02-22 00:16:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[8091 02-22 00:16:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[8092 02-22 00:16:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[8093 02-22 00:16:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8094 02-22 00:16:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8095 02-22 00:16:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151057
[8096 02-22 00:16:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 266CC135049D0E2D82642FCEF6961565ED35FF839409234E653C769CBD84C238
[8097 02-22 00:16:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[8098 02-22 00:16:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[8099 02-22 00:16:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[809a 02-22 00:16:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[809b 02-22 00:16:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[809c 02-22 00:16:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[809d 02-22 00:16:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[809e 02-22 00:16:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[809f 02-22 00:16:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80a0 02-22 00:16:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[80a1 02-22 00:16:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80a2 02-22 00:16:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[80a3 02-22 00:16:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80a4 02-22 00:16:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[80a5 02-22 00:16:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80a6 02-22 00:16:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[80a7 02-22 00:16:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[80a8 02-22 00:16:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[80a9 02-22 00:16:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 6c c1 35 04 9d 0e 2d 82 64 2f ce f6 96 15 65 |&l.5...-.d/....e|
00000010 ed 35 ff 83 94 09 23 4e 65 3c 76 9c bd 84 c2 38 |.5....#Ne<v....8|
[80aa 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a df b4 c3 d6 e3 71 ff 5f c1 9f 0f |0D. ......q._...|
00000010 50 b5 97 4f 22 14 0e ba cc ce 00 8e 3f 2e 75 6e |P..O".......?.un|
00000020 95 0c 61 1b 02 20 56 95 3f 22 1c 06 d9 0a bc 58 |..a.. V.?".....X|
00000030 b3 49 1d e4 ca c9 59 9a 79 6a 51 d5 c9 7a 13 c7 |.I....Y.yjQ..z..|
00000040 10 44 7e 1e 45 f0 |.D~.E.|
[80ab 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[80ac 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[80ad 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80ae 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[80af 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[80b0 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 8e 6e 3d 53 f6 d9 2a b0 8f c8 92 c3 b2 79 68 |C.n=S..*......yh|
00000010 7e 71 7a ed d9 c2 47 c4 7e 45 bc d3 cb 29 1e 26 |~qz...G.~E...).&|
[80b1 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 0f 37 c9 f0 be 30 6a ae 32 c5 1d |0D. (.7...0j.2..|
00000010 86 0f 5f 93 1f 15 9e 8c e5 d2 9b e7 4a d3 aa 75 |.._.........J..u|
00000020 a8 16 09 16 02 20 4e 60 f3 c9 d4 3f cd f8 97 72 |..... N`...?...r|
00000030 7a 64 71 a0 4a 08 22 97 48 65 88 a8 1f 79 3f 18 |zdq.J.".He...y?.|
00000040 d2 ec 75 84 ca 09 |..u...|
[80b2 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes
[80b3 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80b4 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[80b5 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[80b6 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[80b7 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[80b8 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[80b9 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[80ba 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[80bb 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[80bc 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 40 57 6c 5a ba 75 0e 91 23 4b e0 79 95 6e 5c 0c |@WlZ.u..#K.y.n\.|
00000010 a9 cd 82 9d b9 f1 58 f7 5f b4 53 09 3f 05 19 e1 |......X._.S.?...|
[80bd 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 5d 5e 66 f0 a6 4d 6f 16 37 88 c8 |0D. G]^f..Mo.7..|
00000010 96 06 75 28 f7 d8 7f 88 02 26 db 80 a9 c3 e9 89 |..u(.....&......|
00000020 39 ae 1b af 02 20 1d 01 e5 ea d0 2b e0 60 77 fe |9.... .....+.`w.|
00000030 bb c8 7c 65 4e 75 26 02 83 50 fb 57 81 40 26 2e |..|eNu&..P.W.@&.|
00000040 c0 a3 7d 3d 51 13 |..}=Q.|
[80be 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[80bf 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96eb0 gate 1582330586595788900 evaluation starts
[80c0 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96eb0 signed by 0 principal evaluation starts (used [false])
[80c1 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96eb0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[80c2 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[80c3 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96eb0 principal evaluation fails
[80c4 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b96eb0 gate 1582330586595788900 evaluation fails
[80c5 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[80c6 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[80c7 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[80c8 02-22 00:16:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 40 57 6c 5a ba 75 0e 91 23 4b e0 79 95 6e 5c 0c |@WlZ.u..#K.y.n\.|
00000010 a9 cd 82 9d b9 f1 58 f7 5f b4 53 09 3f 05 19 e1 |......X._.S.?...|
[80c9 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 5d 5e 66 f0 a6 4d 6f 16 37 88 c8 |0D. G]^f..Mo.7..|
00000010 96 06 75 28 f7 d8 7f 88 02 26 db 80 a9 c3 e9 89 |..u(.....&......|
00000020 39 ae 1b af 02 20 1d 01 e5 ea d0 2b e0 60 77 fe |9.... .....+.`w.|
00000030 bb c8 7c 65 4e 75 26 02 83 50 fb 57 81 40 26 2e |..|eNu&..P.W.@&.|
00000040 c0 a3 7d 3d 51 13 |..}=Q.|
[80ca 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[80cb 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b977b0 gate 1582330586601745500 evaluation starts
[80cc 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b977b0 signed by 0 principal evaluation starts (used [false])
[80cd 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b977b0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[80ce 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b977b0 principal evaluation succeeds for identity 0
[80cf 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b977b0 gate 1582330586601745500 evaluation succeeds
[80d0 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[80d1 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[80d2 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[80d3 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[80d4 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes
[80d5 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80d6 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80d7 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[80d8 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80d9 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[80da 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[80db 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 6c c1 35 04 9d 0e 2d 82 64 2f ce f6 96 15 65 |&l.5...-.d/....e|
00000010 ed 35 ff 83 94 09 23 4e 65 3c 76 9c bd 84 c2 38 |.5....#Ne<v....8|
[80dc 02-22 00:16:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a df b4 c3 d6 e3 71 ff 5f c1 9f 0f |0D. ......q._...|
00000010 50 b5 97 4f 22 14 0e ba cc ce 00 8e 3f 2e 75 6e |P..O".......?.un|
00000020 95 0c 61 1b 02 20 56 95 3f 22 1c 06 d9 0a bc 58 |..a.. V.?".....X|
00000030 b3 49 1d e4 ca c9 59 9a 79 6a 51 d5 c9 7a 13 c7 |.I....Y.yjQ..z..|
00000040 10 44 7e 1e 45 f0 |.D~.E.|
[80dd 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[80de 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 12 53 55 e0 32 8f 1d 17 06 13 15 |0D. t.SU.2......|
00000010 31 33 2b dd fe 3b 8c 11 6c 54 65 ca 3f 84 32 5b |13+..;..lTe.?.2[|
00000020 3d 18 42 e4 02 20 48 3c 79 27 70 32 09 04 0d 04 |=.B.. H<y'p2....|
00000030 e9 a8 9e 1c 37 02 54 48 12 dd f7 8e 6b fa 13 c7 |....7.TH....k...|
00000040 a0 83 1f bb e7 9b |......|
[80df 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[80e0 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[80e1 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80e2 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80e3 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[80e4 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80e5 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[80e6 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 6c c1 35 04 9d 0e 2d 82 64 2f ce f6 96 15 65 |&l.5...-.d/....e|
00000010 ed 35 ff 83 94 09 23 4e 65 3c 76 9c bd 84 c2 38 |.5....#Ne<v....8|
[80e7 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a df b4 c3 d6 e3 71 ff 5f c1 9f 0f |0D. ......q._...|
00000010 50 b5 97 4f 22 14 0e ba cc ce 00 8e 3f 2e 75 6e |P..O".......?.un|
00000020 95 0c 61 1b 02 20 56 95 3f 22 1c 06 d9 0a bc 58 |..a.. V.?".....X|
00000030 b3 49 1d e4 ca c9 59 9a 79 6a 51 d5 c9 7a 13 c7 |.I....Y.yjQ..z..|
00000040 10 44 7e 1e 45 f0 |.D~.E.|
[80e8 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[80e9 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes
[80ea 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80eb 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[80ec 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 43 8e 6e 3d 53 f6 d9 2a b0 8f c8 92 c3 b2 79 68 |C.n=S..*......yh|
00000010 7e 71 7a ed d9 c2 47 c4 7e 45 bc d3 cb 29 1e 26 |~qz...G.~E...).&|
[80ed 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 0f 37 c9 f0 be 30 6a ae 32 c5 1d |0D. (.7...0j.2..|
00000010 86 0f 5f 93 1f 15 9e 8c e5 d2 9b e7 4a d3 aa 75 |.._.........J..u|
00000020 a8 16 09 16 02 20 4e 60 f3 c9 d4 3f cd f8 97 72 |..... N`...?...r|
00000030 7a 64 71 a0 4a 08 22 97 48 65 88 a8 1f 79 3f 18 |zdq.J.".He...y?.|
00000040 d2 ec 75 84 ca 09 |..u...|
[80ee 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes
[80ef 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80f0 02-22 00:16:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80f1 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[80f2 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[80f3 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[80f4 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[80f5 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[80f6 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[80f7 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[80f8 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[80f9 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[80fa 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[80fb 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[80fc 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 df 73 ac 95 5d 6d 0a 4d 3e cd 1e 2a b2 6e b5 |..s..]m.M>..*.n.|
00000010 a9 52 6e c1 19 a3 5b 8b 26 e8 b2 11 1a c6 34 56 |.Rn...[.&.....4V|
[80fd 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 b0 7b 74 bb 91 0b 9f 33 80 3b b3 |0D. R.{t....3.;.|
00000010 8e ff 4b 71 04 16 3c 79 4a 28 fb 8d 33 ac ef d6 |..Kq..<yJ(..3...|
00000020 0d 87 f7 4d 02 20 74 9c 56 ec 63 72 38 8e 24 14 |...M. t.V.cr8.$.|
00000030 6e a6 51 b2 05 ca 9f c0 c6 bb 8d 1c 5c 1b ce 74 |n.Q.........\..t|
00000040 8c 4f 69 ad 58 95 |.Oi.X.|
[80fe 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[80ff 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a21e0 gate 1582330586653473100 evaluation starts
[8100 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a21e0 signed by 0 principal evaluation starts (used [false])
[8101 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a21e0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8102 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a21e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8103 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a21e0 principal evaluation fails
[8104 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a21e0 gate 1582330586653473100 evaluation fails
[8105 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8106 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8107 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8108 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 df 73 ac 95 5d 6d 0a 4d 3e cd 1e 2a b2 6e b5 |..s..]m.M>..*.n.|
00000010 a9 52 6e c1 19 a3 5b 8b 26 e8 b2 11 1a c6 34 56 |.Rn...[.&.....4V|
[8109 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 b0 7b 74 bb 91 0b 9f 33 80 3b b3 |0D. R.{t....3.;.|
00000010 8e ff 4b 71 04 16 3c 79 4a 28 fb 8d 33 ac ef d6 |..Kq..<yJ(..3...|
00000020 0d 87 f7 4d 02 20 74 9c 56 ec 63 72 38 8e 24 14 |...M. t.V.cr8.$.|
00000030 6e a6 51 b2 05 ca 9f c0 c6 bb 8d 1c 5c 1b ce 74 |n.Q.........\..t|
00000040 8c 4f 69 ad 58 95 |.Oi.X.|
[810a 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[810b 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a2b10 gate 1582330586653868700 evaluation starts
[810c 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a2b10 signed by 0 principal evaluation starts (used [false])
[810d 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a2b10 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[810e 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a2b10 principal evaluation succeeds for identity 0
[810f 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a2b10 gate 1582330586653868700 evaluation succeeds
[8110 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8111 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8112 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8113 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8114 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes
[8115 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes]}
[8116 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:88
[8117 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:88
[8118 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:87 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[8119 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[811a 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[811b 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[811c 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[811d 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[811e 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[811f 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8120 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[8121 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[8122 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[8123 02-22 00:16:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8124 02-22 00:16:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8125 02-22 00:16:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8126 02-22 00:16:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[8127 02-22 00:16:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[8128 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8129 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[812a 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[812b 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[812c 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[812d 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[812e 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8130 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[812f 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[8131 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8132 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8133 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8134 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8135 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8136 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8137 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8138 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[8139 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[813a 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[813b 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c0af0 gate 1582330586979426100 evaluation starts
[813c 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c0af0 signed by 0 principal evaluation starts (used [false])
[813d 02-22 00:16:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c0af0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[813e 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c0af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[813f 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c0af0 principal evaluation fails
[8140 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c0af0 gate 1582330586979426100 evaluation fails
[8141 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8142 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8143 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8144 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[8145 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[8146 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8147 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c14f0 gate 1582330586982748400 evaluation starts
[8148 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c14f0 signed by 0 principal evaluation starts (used [false])
[8149 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c14f0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[814a 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c14f0 principal evaluation succeeds for identity 0
[814b 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c14f0 gate 1582330586982748400 evaluation succeeds
[814c 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[814d 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[814e 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[814f 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8150 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 bb f9 b3 ae 00 00 35 24 2f dd 01 a1 9c da |........5$/.....|
00000010 b8 7f 78 86 f1 13 01 38 9e 43 2c 9a 0b 7f 81 7c |..x....8.C,....||
[8151 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae ef 65 ca 50 56 7d 82 bf 1b 33 |0E.!...e.PV}...3|
00000010 82 6c c3 71 1b f1 c2 20 4b a1 36 7c 0d 4c ff 33 |.l.q... K.6|.L.3|
00000020 dd 20 f8 dc 1b 02 20 5d 61 08 72 e0 77 a4 af 78 |. .... ]a.r.w..x|
00000030 36 f3 f9 99 83 58 00 26 0e b3 e0 ce f7 5d e8 9b |6....X.&.....]..|
00000040 b3 e8 92 8b 7f 34 50 |.....4P|
[8152 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[8153 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[8154 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8155 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8156 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8157 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8158 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8159 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[815a 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[815b 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[815c 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[815d 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[815e 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[815f 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d5cf0 gate 1582330586989476400 evaluation starts
[8160 02-22 00:16:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d5cf0 signed by 0 principal evaluation starts (used [false])
[8161 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d5cf0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8162 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d5cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8163 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d5cf0 principal evaluation fails
[8164 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d5cf0 gate 1582330586989476400 evaluation fails
[8165 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8166 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8167 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8168 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[8169 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[816a 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[816b 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a45f0 gate 1582330586991272000 evaluation starts
[816c 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a45f0 signed by 0 principal evaluation starts (used [false])
[816d 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a45f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[816e 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a45f0 principal evaluation succeeds for identity 0
[816f 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a45f0 gate 1582330586991272000 evaluation succeeds
[8170 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8171 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8172 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8173 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8174 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8175 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[8176 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[8177 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[8178 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 bb f9 b3 ae 00 00 35 24 2f dd 01 a1 9c da |........5$/.....|
00000010 b8 7f 78 86 f1 13 01 38 9e 43 2c 9a 0b 7f 81 7c |..x....8.C,....||
[8179 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae ef 65 ca 50 56 7d 82 bf 1b 33 |0E.!...e.PV}...3|
00000010 82 6c c3 71 1b f1 c2 20 4b a1 36 7c 0d 4c ff 33 |.l.q... K.6|.L.3|
00000020 dd 20 f8 dc 1b 02 20 5d 61 08 72 e0 77 a4 af 78 |. .... ]a.r.w..x|
00000030 36 f3 f9 99 83 58 00 26 0e b3 e0 ce f7 5d e8 9b |6....X.&.....]..|
00000040 b3 e8 92 8b 7f 34 50 |.....4P|
[817a 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[817b 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[817c 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[817d 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[817e 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[817f 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8180 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8181 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8182 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[8183 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[8184 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8185 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5020 gate 1582330586998333200 evaluation starts
[8186 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5020 signed by 0 principal evaluation starts (used [false])
[8187 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5020 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8188 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8189 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5020 principal evaluation fails
[818a 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5020 gate 1582330586998333200 evaluation fails
[818b 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[818c 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[818d 02-22 00:16:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[818e 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[818f 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[8190 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8191 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5920 gate 1582330587001279800 evaluation starts
[8192 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5920 signed by 0 principal evaluation starts (used [false])
[8193 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5920 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8194 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5920 principal evaluation succeeds for identity 0
[8195 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b5920 gate 1582330587001279800 evaluation succeeds
[8196 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8197 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8198 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8199 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[819a 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[819b 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[819c 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[819d 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[819e 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[819f 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[81a0 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[81a1 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[81a2 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[81a3 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[81a4 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[81a5 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003665390 gate 1582330587008289100 evaluation starts
[81a6 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003665390 signed by 0 principal evaluation starts (used [false])
[81a7 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003665390 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[81a8 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003665390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[81a9 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003665390 principal evaluation fails
[81aa 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003665390 gate 1582330587008289100 evaluation fails
[81ab 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[81ac 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[81ad 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[81ae 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[81af 02-22 00:16:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[81b0 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[81b1 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003665cb0 gate 1582330587012348800 evaluation starts
[81b2 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003665cb0 signed by 0 principal evaluation starts (used [false])
[81b3 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003665cb0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[81b4 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003665cb0 principal evaluation succeeds for identity 0
[81b5 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003665cb0 gate 1582330587012348800 evaluation succeeds
[81b6 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[81b7 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[81b8 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[81b9 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[81ba 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[81bb 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[81bc 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[81bd 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[81be 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[81bf 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[81c0 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[81c1 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[81c2 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[81c3 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[81c4 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[81c5 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[81c6 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[81c7 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[81c8 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383b9d0 gate 1582330587018281000 evaluation starts
[81c9 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383b9d0 signed by 0 principal evaluation starts (used [false])
[81ca 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383b9d0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[81cb 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383b9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[81cc 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383b9d0 principal evaluation fails
[81cd 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383b9d0 gate 1582330587018281000 evaluation fails
[81ce 02-22 00:16:27.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[81cf 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[81d0 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[81d1 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[81d2 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[81d3 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[81d4 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385e2f0 gate 1582330587020849900 evaluation starts
[81d5 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385e2f0 signed by 0 principal evaluation starts (used [false])
[81d6 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385e2f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[81d7 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385e2f0 principal evaluation succeeds for identity 0
[81d8 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385e2f0 gate 1582330587020849900 evaluation succeeds
[81d9 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[81da 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[81db 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[81dc 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[81dd 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 bb f9 b3 ae 00 00 35 24 2f dd 01 a1 9c da |........5$/.....|
00000010 b8 7f 78 86 f1 13 01 38 9e 43 2c 9a 0b 7f 81 7c |..x....8.C,....||
[81de 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae ef 65 ca 50 56 7d 82 bf 1b 33 |0E.!...e.PV}...3|
00000010 82 6c c3 71 1b f1 c2 20 4b a1 36 7c 0d 4c ff 33 |.l.q... K.6|.L.3|
00000020 dd 20 f8 dc 1b 02 20 5d 61 08 72 e0 77 a4 af 78 |. .... ]a.r.w..x|
00000030 36 f3 f9 99 83 58 00 26 0e b3 e0 ce f7 5d e8 9b |6....X.&.....]..|
00000040 b3 e8 92 8b 7f 34 50 |.....4P|
[81df 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[81e0 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[81e1 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[81e2 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[81e3 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[81e4 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[81e5 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[81e6 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[81e7 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[81e8 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[81e9 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[81ea 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[81eb 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[81ec 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389eb10 gate 1582330587028139200 evaluation starts
[81ed 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389eb10 signed by 0 principal evaluation starts (used [false])
[81ee 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389eb10 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[81ef 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389eb10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[81f0 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389eb10 principal evaluation fails
[81f1 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389eb10 gate 1582330587028139200 evaluation fails
[81f2 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[81f3 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[81f4 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[81f5 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[81f6 02-22 00:16:27.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[81f7 02-22 00:16:27.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[81f8 02-22 00:16:27.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389f410 gate 1582330587032188000 evaluation starts
[81f9 02-22 00:16:27.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389f410 signed by 0 principal evaluation starts (used [false])
[81fa 02-22 00:16:27.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389f410 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[81fb 02-22 00:16:27.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389f410 principal evaluation succeeds for identity 0
[81fc 02-22 00:16:27.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389f410 gate 1582330587032188000 evaluation succeeds
[81fd 02-22 00:16:27.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[81fe 02-22 00:16:27.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[81ff 02-22 00:16:27.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8200 02-22 00:16:27.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8201 02-22 00:16:27.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8202 02-22 00:16:27.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8203 02-22 00:16:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8204 02-22 00:16:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[8205 02-22 00:16:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8206 02-22 00:16:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8207 02-22 00:16:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:351824787428162431 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[8208 02-22 00:16:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:351824787428162431 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[8209 02-22 00:16:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[820a 02-22 00:16:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 351824787428162431 , Msg_type: BLOCK_MSG, digests: [6 7 8 1 2 3 4 5], Envelope: 57 bytes, Signature: 0 bytes
[820b 02-22 00:16:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 351824787428162431 , Msg_type: BLOCK_MSG, digests: [6 7 8 1 2 3 4 5], Envelope: 57 bytes, Signature: 0 bytes
[820c 02-22 00:16:27.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[820d 02-22 00:16:27.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[820e 02-22 00:16:27.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[820f 02-22 00:16:27.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8210 02-22 00:16:27.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8211 02-22 00:16:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9847024986762131369 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[8212 02-22 00:16:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:9847024986762131369 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[8213 02-22 00:16:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6 7 8] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[8214 02-22 00:16:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8215 02-22 00:16:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[8216 02-22 00:16:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8217 02-22 00:16:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8218 02-22 00:16:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8219 02-22 00:16:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[821a 02-22 00:16:28.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[821b 02-22 00:16:28.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[821c 02-22 00:16:28.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[821d 02-22 00:16:28.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[821e 02-22 00:16:28.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[821f 02-22 00:16:28.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8220 02-22 00:16:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s
[8221 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[8222 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8223 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[8224 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[8225 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 b4 59 4d 5d 32 50 6f ce e4 78 72 66 f1 35 8b |..YM]2Po..xrf.5.|
00000010 94 e6 ca b9 85 b5 05 16 a5 19 c3 b4 73 84 2b ef |............s.+.|
[8226 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 ce 51 b4 63 14 ff 40 a1 c7 0f |0E.!...Q.c..@...|
00000010 05 3e e3 28 7a 8e 96 10 95 9f 40 f2 65 16 9a 7e |.>.(z.....@.e..~|
00000020 97 9f d2 ce 92 02 20 05 5a c5 43 ab fa 72 4c 2d |...... .Z.C..rL-|
00000030 d6 49 c2 c1 f4 ae 3f 32 8a 5d f0 cf a2 50 73 64 |.I....?2.]...Psd|
00000040 b1 b4 90 38 9f 82 56 |...8..V|
[8227 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[8228 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 1a 9a 87 05 16 50 2a cd 8e 0a fb |0D. H.....P*....|
00000010 63 e2 22 83 8b 52 41 a9 20 be 5e d5 58 43 ef 71 |c."..RA. .^.XC.q|
00000020 c4 98 b8 d5 02 20 04 8f b9 a7 14 05 c3 c3 00 eb |..... ..........|
00000030 c2 08 d0 40 3f 8b 6b 86 4c 75 6f e8 17 f5 75 d2 |...@?.k.Luo...u.|
00000040 1f 2d 63 37 7e 00 |.-c7~.|
[8229 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[822a 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[822b 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:92
[822c 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:92
[822d 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[822e 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[822f 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8230 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8231 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8232 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8233 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8234 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[8235 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8236 02-22 00:16:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[8237 02-22 00:16:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes
[8238 02-22 00:16:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes
[8239 02-22 00:16:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[823a 02-22 00:16:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[823b 02-22 00:16:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes
[823c 02-22 00:16:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[823d 02-22 00:16:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes
[823e 02-22 00:16:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[823f 02-22 00:16:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes
[8240 02-22 00:16:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes
[8241 02-22 00:16:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8242 02-22 00:16:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes
[8243 02-22 00:16:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8244 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes
[8245 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes
[8246 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8247 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes
[8248 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[8249 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[824a 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[824b 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[824c 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[824d 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[824e 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[824f 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8250 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 7b d2 5d df 71 17 63 9f 81 4f 79 ab 06 3d b1 |.{.].q.c..Oy..=.|
00000010 db d8 19 68 78 6d 2b 5c 90 8a 49 b4 5b c4 02 5a |...hxm+\..I.[..Z|
[8251 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 87 5a 90 e1 99 22 c0 62 1d 94 0f |0D. \.Z...".b...|
00000010 30 fc da 00 f7 45 c7 f4 51 e8 8f a2 b8 2b b7 01 |0....E..Q....+..|
00000020 51 21 70 90 02 20 7a 13 ec 99 91 55 2d 5a 2b 29 |Q!p.. z....U-Z+)|
00000030 f6 0c e3 d9 47 61 be 2e d5 05 47 a7 75 1d 8e 6a |....Ga....G.u..j|
00000040 bb 3f 76 a0 e5 09 |.?v...|
[8252 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8253 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b31730 gate 1582330589239620600 evaluation starts
[8254 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b31730 signed by 0 principal evaluation starts (used [false])
[8255 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b31730 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8256 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b31730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8257 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b31730 principal evaluation fails
[8258 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b31730 gate 1582330589239620600 evaluation fails
[8259 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[825a 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[825b 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[825c 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 7b d2 5d df 71 17 63 9f 81 4f 79 ab 06 3d b1 |.{.].q.c..Oy..=.|
00000010 db d8 19 68 78 6d 2b 5c 90 8a 49 b4 5b c4 02 5a |...hxm+\..I.[..Z|
[825d 02-22 00:16:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 87 5a 90 e1 99 22 c0 62 1d 94 0f |0D. \.Z...".b...|
00000010 30 fc da 00 f7 45 c7 f4 51 e8 8f a2 b8 2b b7 01 |0....E..Q....+..|
00000020 51 21 70 90 02 20 7a 13 ec 99 91 55 2d 5a 2b 29 |Q!p.. z....U-Z+)|
00000030 f6 0c e3 d9 47 61 be 2e d5 05 47 a7 75 1d 8e 6a |....Ga....G.u..j|
00000040 bb 3f 76 a0 e5 09 |.?v...|
[825e 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[825f 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0e030 gate 1582330589240059900 evaluation starts
[8260 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0e030 signed by 0 principal evaluation starts (used [false])
[8261 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0e030 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8262 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0e030 principal evaluation succeeds for identity 0
[8263 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0e030 gate 1582330589240059900 evaluation succeeds
[8264 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8265 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8266 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8267 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8268 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes
[8269 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes]}
[826a 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:91
[826b 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:91
[826c 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[826d 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[826e 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[826f 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8270 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8271 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8272 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8273 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8274 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8275 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8276 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[8277 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8278 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8279 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes
[827a 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[827b 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[827c 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes
[827d 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[827e 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes
[827f 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8280 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes
[8281 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8282 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes
[8283 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8284 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes
[8285 02-22 00:16:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8286 02-22 00:16:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[8287 02-22 00:16:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[8288 02-22 00:16:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510221801
[8289 02-22 00:16:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9C9EEC5DF6612260291CE15C05DDCF577F9C2C21A9CE4F319ABA3F6A20E4636C
[828a 02-22 00:16:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[828b 02-22 00:16:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[828c 02-22 00:16:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[828d 02-22 00:16:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[828e 02-22 00:16:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[828f 02-22 00:16:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:34 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[8290 02-22 00:16:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8291 02-22 00:16:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8292 02-22 00:16:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:34 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[8293 02-22 00:16:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8294 02-22 00:16:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151058
[8295 02-22 00:16:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C46D461638140DB2E900247CFE73FA20A6170DFE44507A13959E89E783F9D134
[8296 02-22 00:16:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[8297 02-22 00:16:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[8298 02-22 00:16:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[8299 02-22 00:16:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[829a 02-22 00:16:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[829b 02-22 00:16:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[829c 02-22 00:16:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[829d 02-22 00:16:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[829e 02-22 00:16:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[829f 02-22 00:16:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[82a0 02-22 00:16:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[82a1 02-22 00:16:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82a2 02-22 00:16:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes
[82a4 02-22 00:16:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82a3 02-22 00:16:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes
[82a5 02-22 00:16:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82a6 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[82a7 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82a8 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[82a9 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[82aa 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82ab 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[82ac 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[82ad 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[82ae 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[82af 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[82b0 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[82b1 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 71 63 38 12 eb e5 49 f0 46 9a 15 85 40 0a 40 c6 |qc8...I.F...@.@.|
00000010 d6 c9 96 37 64 74 8b f1 58 dd 21 15 4a e8 3c aa |...7dt..X.!.J.<.|
[82b2 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 a9 7a 23 8d 04 ba bb 20 5c ad |0E.!...z#.... \.|
00000010 d9 0e cb 70 c5 52 c9 6c ec ab e4 90 60 6f 08 5e |...p.R.l....`o.^|
00000020 c6 b8 02 09 6e 02 20 5f 4d a6 54 07 e3 55 d5 92 |....n. _M.T..U..|
00000030 3c a0 88 52 bd cb a9 24 03 ef f5 10 9e fa 64 30 |<..R...$......d0|
00000040 ec be c1 b3 3e 6b bd |....>k.|
[82b3 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[82b4 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01530 gate 1582330590129046300 evaluation starts
[82b5 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01530 signed by 0 principal evaluation starts (used [false])
[82b6 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01530 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[82b7 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[82b8 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01530 principal evaluation fails
[82b9 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01530 gate 1582330590129046300 evaluation fails
[82ba 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[82bb 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[82bc 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[82bd 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 71 63 38 12 eb e5 49 f0 46 9a 15 85 40 0a 40 c6 |qc8...I.F...@.@.|
00000010 d6 c9 96 37 64 74 8b f1 58 dd 21 15 4a e8 3c aa |...7dt..X.!.J.<.|
[82be 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 a9 7a 23 8d 04 ba bb 20 5c ad |0E.!...z#.... \.|
00000010 d9 0e cb 70 c5 52 c9 6c ec ab e4 90 60 6f 08 5e |...p.R.l....`o.^|
00000020 c6 b8 02 09 6e 02 20 5f 4d a6 54 07 e3 55 d5 92 |....n. _M.T..U..|
00000030 3c a0 88 52 bd cb a9 24 03 ef f5 10 9e fa 64 30 |<..R...$......d0|
00000040 ec be c1 b3 3e 6b bd |....>k.|
[82bf 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[82c0 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01f30 gate 1582330590129454100 evaluation starts
[82c1 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01f30 signed by 0 principal evaluation starts (used [false])
[82c2 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01f30 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[82c3 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01f30 principal evaluation succeeds for identity 0
[82c4 02-22 00:16:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01f30 gate 1582330590129454100 evaluation succeeds
[82c5 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[82c6 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[82c7 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[82c8 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[82c9 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[82ca 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[82cc 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes]}
[82cd 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:89
[82cb 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[82ce 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:89
[82cf 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:88 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[82d0 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82d1 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82d2 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82d3 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[82d4 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82d5 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82d6 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82d7 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82d8 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82d9 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82da 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82db 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82dc 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[82dd 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82de 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82df 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[82e0 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[82e1 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82e2 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[82e3 02-22 00:16:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82e4 02-22 00:16:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[82e5 02-22 00:16:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes
[82e6 02-22 00:16:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82e7 02-22 00:16:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82e8 02-22 00:16:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:8922188657661220820 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[82e9 02-22 00:16:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:8922188657661220820 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[82ea 02-22 00:16:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82eb 02-22 00:16:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82ec 02-22 00:16:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82ed 02-22 00:16:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82ee 02-22 00:16:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82ef 02-22 00:16:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[82f0 02-22 00:16:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[82f1 02-22 00:16:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82f2 02-22 00:16:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[82f3 02-22 00:16:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[82f4 02-22 00:16:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[82f5 02-22 00:16:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[82f6 02-22 00:16:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 22 29 0e 9e 50 fa 11 9e 1a fd f9 5b a1 2b 48 |<")..P......[.+H|
00000010 51 9c af b7 a9 89 f0 25 a0 2e aa 67 0e 1d 25 7e |Q......%...g..%~|
[82f7 02-22 00:16:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 04 b9 e8 f0 c5 de b2 13 55 b3 |0E.!..........U.|
00000010 0f 9f b1 3d 61 3f 2f f0 1d c2 59 80 ec 6d 47 07 |...=a?/...Y..mG.|
00000020 40 af 7c 40 bc 02 20 5e 29 99 ba 4a 55 82 c6 fd |@.|@.. ^)..JU...|
00000030 f9 cd 68 f9 43 7c 3a c0 83 08 6a 4b 87 5d 13 19 |..h.C|:...jK.]..|
00000040 ed 08 20 b1 d0 af 10 |.. ....|
[82f8 02-22 00:16:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[82f9 02-22 00:16:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 a1 28 f9 4e 81 1d c4 2b 7b fa |0E.!...(.N...+{.|
00000010 ea 5a a2 86 71 69 d0 36 88 a7 f0 6f 2d f8 82 af |.Z..qi.6...o-...|
00000020 4e 6e 47 c3 ac 02 20 60 3a f3 9a 4a 1c 9a 83 42 |NnG... `:..J...B|
00000030 b2 ba a8 24 5a 4f 2b 60 64 37 da d7 c9 7b 52 c8 |...$ZO+`d7...{R.|
00000040 f6 88 47 85 24 04 53 |..G.$.S|
[82fa 02-22 00:16:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[82fb 02-22 00:16:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[82fc 02-22 00:16:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:93
[82fd 02-22 00:16:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:93
[82fe 02-22 00:16:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[82ff 02-22 00:16:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8300 02-22 00:16:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8301 02-22 00:16:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8302 02-22 00:16:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[8303 02-22 00:16:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8304 02-22 00:16:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8305 02-22 00:16:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[8306 02-22 00:16:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[8307 02-22 00:16:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[8308 02-22 00:16:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8309 02-22 00:16:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:6192251623369368332 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[830a 02-22 00:16:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:6192251623369368332 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[830b 02-22 00:16:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[830c 02-22 00:16:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[830d 02-22 00:16:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:1518825510614923416 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[830e 02-22 00:16:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:1518825510614923416 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[830f 02-22 00:16:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1518825510614923416 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8310 02-22 00:16:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8311 02-22 00:16:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8312 02-22 00:16:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8313 02-22 00:16:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8314 02-22 00:16:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8315 02-22 00:16:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8316 02-22 00:16:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[8317 02-22 00:16:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8318 02-22 00:16:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[8319 02-22 00:16:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2134215973548921035 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[831a 02-22 00:16:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[831b 02-22 00:16:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:11083689867992425104 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[831c 02-22 00:16:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[831d 02-22 00:16:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:17301593956160479398 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[831e 02-22 00:16:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:17301593956160479398 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[831f 02-22 00:16:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8320 02-22 00:16:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2134215973548921035 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8321 02-22 00:16:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8322 02-22 00:16:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:11083689867992425104 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8323 02-22 00:16:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8324 02-22 00:16:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11083689867992425104 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[8325 02-22 00:16:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11083689867992425104 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[8326 02-22 00:16:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8327 02-22 00:16:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17301593956160479398 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[8328 02-22 00:16:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17301593956160479398 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 154 bytes, Signature: 0 bytes
[8329 02-22 00:16:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[832a 02-22 00:16:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2134215973548921035 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[832b 02-22 00:16:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2134215973548921035 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[832c 02-22 00:16:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2134215973548921035 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[832d 02-22 00:16:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[832e 02-22 00:16:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[832f 02-22 00:16:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8330 02-22 00:16:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8331 02-22 00:16:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8332 02-22 00:16:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[8333 02-22 00:16:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8334 02-22 00:16:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8335 02-22 00:16:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8336 02-22 00:16:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8337 02-22 00:16:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8338 02-22 00:16:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8339 02-22 00:16:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[833a 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a 8c 7c 3b da 07 6a 91 f7 ff 98 08 32 d8 5c 9f |..|;..j.....2.\.|
00000010 f1 fb 48 44 83 19 0d a2 32 38 63 56 08 a2 bf e0 |..HD....28cV....|
[833b 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 4d b7 58 54 83 a2 10 bc f2 49 2b |0D. 3M.XT.....I+|
00000010 8b a4 b0 e4 76 5b 8d a7 32 79 52 08 5f b6 d8 6a |....v[..2yR._..j|
00000020 2f b3 13 d6 02 20 47 b5 58 27 40 8e 0a ba 71 55 |/.... G.X'@...qU|
00000030 6e 07 a7 60 4f 6b d9 d5 aa 08 c0 20 35 96 77 da |n..`Ok..... 5.w.|
00000040 ce e5 a9 f1 d5 07 |......|
[833c 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[833d 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d6410 gate 1582330590465496300 evaluation starts
[833e 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d6410 signed by 0 principal evaluation starts (used [false])
[833f 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d6410 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8340 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d6410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8341 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d6410 principal evaluation fails
[8342 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d6410 gate 1582330590465496300 evaluation fails
[8343 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8344 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8345 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8346 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a 8c 7c 3b da 07 6a 91 f7 ff 98 08 32 d8 5c 9f |..|;..j.....2.\.|
00000010 f1 fb 48 44 83 19 0d a2 32 38 63 56 08 a2 bf e0 |..HD....28cV....|
[8347 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 4d b7 58 54 83 a2 10 bc f2 49 2b |0D. 3M.XT.....I+|
00000010 8b a4 b0 e4 76 5b 8d a7 32 79 52 08 5f b6 d8 6a |....v[..2yR._..j|
00000020 2f b3 13 d6 02 20 47 b5 58 27 40 8e 0a ba 71 55 |/.... G.X'@...qU|
00000030 6e 07 a7 60 4f 6b d9 d5 aa 08 c0 20 35 96 77 da |n..`Ok..... 5.w.|
00000040 ce e5 a9 f1 d5 07 |......|
[8348 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8349 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d6d20 gate 1582330590465933300 evaluation starts
[834a 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d6d20 signed by 0 principal evaluation starts (used [false])
[834b 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d6d20 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[834c 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d6d20 principal evaluation succeeds for identity 0
[834d 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d6d20 gate 1582330590465933300 evaluation succeeds
[834e 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[834f 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8350 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8351 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8352 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes
[8353 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes]}
[8354 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:92
[8355 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:92
[8356 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:91 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[8357 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8358 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[835a 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[835b 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[835c 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[835d 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[835e 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[835f 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[8360 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8361 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8359 02-22 00:16:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8362 02-22 00:16:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151059
[8363 02-22 00:16:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8BB39DB67583B77BB34808C848B748C9884545C8B506A11E02EAC1BD39D12285
[8364 02-22 00:16:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[8365 02-22 00:16:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[8366 02-22 00:16:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[8367 02-22 00:16:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8368 02-22 00:16:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[8369 02-22 00:16:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[836a 02-22 00:16:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[836b 02-22 00:16:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[836c 02-22 00:16:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[836d 02-22 00:16:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[836e 02-22 00:16:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[836f 02-22 00:16:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8370 02-22 00:16:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8371 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[8372 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8373 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[8374 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[8375 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b b3 9d b6 75 83 b7 7b b3 48 08 c8 48 b7 48 c9 |....u..{.H..H.H.|
00000010 88 45 45 c8 b5 06 a1 1e 02 ea c1 bd 39 d1 22 85 |.EE.........9.".|
[8376 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 4a 94 db c5 f8 4f 57 4a 7a 25 2e |0D. QJ....OWJz%.|
00000010 04 75 9e 3f 6e 5b 11 bf b1 48 2e 15 12 28 a1 5c |.u.?n[...H...(.\|
00000020 7e ba 10 c3 02 20 54 9a 33 69 58 30 8e ee ba 26 |~.... T.3iX0...&|
00000030 fb 13 78 1b 3b 37 80 e0 c5 74 62 32 80 8f a0 53 |..x.;7...tb2...S|
00000040 37 8f f5 18 97 4a |7....J|
[8377 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[8378 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f 68 98 01 91 7f 6d 6b af 25 0f 39 |0D. .h....mk.%.9|
00000010 79 fd d7 9b 62 20 84 fa 2d 00 ed 67 92 e2 a2 f5 |y...b ..-..g....|
00000020 6c 96 fc fd 02 20 51 3c 0e 04 66 64 84 e1 d7 68 |l.... Q<..fd...h|
00000030 f1 f3 96 c0 bb e1 86 a8 f1 78 88 d5 29 5d be c9 |.........x..)]..|
00000040 53 73 4e 2e 07 b3 |SsN...|
[8379 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[837a 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[837b 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[837c 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[837d 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[837e 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[837f 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8380 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8382 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[8383 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b b3 9d b6 75 83 b7 7b b3 48 08 c8 48 b7 48 c9 |....u..{.H..H.H.|
00000010 88 45 45 c8 b5 06 a1 1e 02 ea c1 bd 39 d1 22 85 |.EE.........9.".|
[8384 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 4a 94 db c5 f8 4f 57 4a 7a 25 2e |0D. QJ....OWJz%.|
00000010 04 75 9e 3f 6e 5b 11 bf b1 48 2e 15 12 28 a1 5c |.u.?n[...H...(.\|
00000020 7e ba 10 c3 02 20 54 9a 33 69 58 30 8e ee ba 26 |~.... T.3iX0...&|
00000030 fb 13 78 1b 3b 37 80 e0 c5 74 62 32 80 8f a0 53 |..x.;7...tb2...S|
00000040 37 8f f5 18 97 4a |7....J|
[8385 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes
[8386 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes
[8387 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8388 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[8389 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 22 29 0e 9e 50 fa 11 9e 1a fd f9 5b a1 2b 48 |<")..P......[.+H|
00000010 51 9c af b7 a9 89 f0 25 a0 2e aa 67 0e 1d 25 7e |Q......%...g..%~|
[838a 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 04 b9 e8 f0 c5 de b2 13 55 b3 |0E.!..........U.|
00000010 0f 9f b1 3d 61 3f 2f f0 1d c2 59 80 ec 6d 47 07 |...=a?/...Y..mG.|
00000020 40 af 7c 40 bc 02 20 5e 29 99 ba 4a 55 82 c6 fd |@.|@.. ^)..JU...|
00000030 f9 cd 68 f9 43 7c 3a c0 83 08 6a 4b 87 5d 13 19 |..h.C|:...jK.]..|
00000040 ed 08 20 b1 d0 af 10 |.. ....|
[838b 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes
[838c 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[838d 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8381 02-22 00:16:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[838e 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[838f 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8390 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[8391 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b b3 9d b6 75 83 b7 7b b3 48 08 c8 48 b7 48 c9 |....u..{.H..H.H.|
00000010 88 45 45 c8 b5 06 a1 1e 02 ea c1 bd 39 d1 22 85 |.EE.........9.".|
[8392 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 4a 94 db c5 f8 4f 57 4a 7a 25 2e |0D. QJ....OWJz%.|
00000010 04 75 9e 3f 6e 5b 11 bf b1 48 2e 15 12 28 a1 5c |.u.?n[...H...(.\|
00000020 7e ba 10 c3 02 20 54 9a 33 69 58 30 8e ee ba 26 |~.... T.3iX0...&|
00000030 fb 13 78 1b 3b 37 80 e0 c5 74 62 32 80 8f a0 53 |..x.;7...tb2...S|
00000040 37 8f f5 18 97 4a |7....J|
[8393 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes
[8394 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:89 , Envelope: 83 bytes, Signature: 70 bytes
[8395 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8396 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[8397 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 22 29 0e 9e 50 fa 11 9e 1a fd f9 5b a1 2b 48 |<")..P......[.+H|
00000010 51 9c af b7 a9 89 f0 25 a0 2e aa 67 0e 1d 25 7e |Q......%...g..%~|
[8398 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 04 b9 e8 f0 c5 de b2 13 55 b3 |0E.!..........U.|
00000010 0f 9f b1 3d 61 3f 2f f0 1d c2 59 80 ec 6d 47 07 |...=a?/...Y..mG.|
00000020 40 af 7c 40 bc 02 20 5e 29 99 ba 4a 55 82 c6 fd |@.|@.. ^)..JU...|
00000030 f9 cd 68 f9 43 7c 3a c0 83 08 6a 4b 87 5d 13 19 |..h.C|:...jK.]..|
00000040 ed 08 20 b1 d0 af 10 |.. ....|
[8399 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes
[839a 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[839b 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[839c 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[839d 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[839e 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[839f 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[83a0 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[83a1 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[83a2 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[83a3 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a 8c 7c 3b da 07 6a 91 f7 ff 98 08 32 d8 5c 9f |..|;..j.....2.\.|
00000010 f1 fb 48 44 83 19 0d a2 32 38 63 56 08 a2 bf e0 |..HD....28cV....|
[83a4 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 4d b7 58 54 83 a2 10 bc f2 49 2b |0D. 3M.XT.....I+|
00000010 8b a4 b0 e4 76 5b 8d a7 32 79 52 08 5f b6 d8 6a |....v[..2yR._..j|
00000020 2f b3 13 d6 02 20 47 b5 58 27 40 8e 0a ba 71 55 |/.... G.X'@...qU|
00000030 6e 07 a7 60 4f 6b d9 d5 aa 08 c0 20 35 96 77 da |n..`Ok..... 5.w.|
00000040 ce e5 a9 f1 d5 07 |......|
[83a5 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[83a6 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af0f50 gate 1582330590562474500 evaluation starts
[83a7 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af0f50 signed by 0 principal evaluation starts (used [false])
[83a8 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af0f50 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[83a9 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af0f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[83aa 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af0f50 principal evaluation fails
[83ab 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af0f50 gate 1582330590562474500 evaluation fails
[83ac 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[83ad 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[83ae 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[83af 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a 8c 7c 3b da 07 6a 91 f7 ff 98 08 32 d8 5c 9f |..|;..j.....2.\.|
00000010 f1 fb 48 44 83 19 0d a2 32 38 63 56 08 a2 bf e0 |..HD....28cV....|
[83b0 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 4d b7 58 54 83 a2 10 bc f2 49 2b |0D. 3M.XT.....I+|
00000010 8b a4 b0 e4 76 5b 8d a7 32 79 52 08 5f b6 d8 6a |....v[..2yR._..j|
00000020 2f b3 13 d6 02 20 47 b5 58 27 40 8e 0a ba 71 55 |/.... G.X'@...qU|
00000030 6e 07 a7 60 4f 6b d9 d5 aa 08 c0 20 35 96 77 da |n..`Ok..... 5.w.|
00000040 ce e5 a9 f1 d5 07 |......|
[83b1 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[83b2 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af1850 gate 1582330590563015700 evaluation starts
[83b3 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af1850 signed by 0 principal evaluation starts (used [false])
[83b4 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af1850 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[83b5 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af1850 principal evaluation succeeds for identity 0
[83b6 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af1850 gate 1582330590563015700 evaluation succeeds
[83b7 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[83b8 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[83b9 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[83ba 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[83bb 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes
[83bc 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[83bd 02-22 00:16:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[83be 02-22 00:16:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[83bf 02-22 00:16:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[83c0 02-22 00:16:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[83c1 02-22 00:16:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[83c2 02-22 00:16:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[83c3 02-22 00:16:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[83c4 02-22 00:16:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[83c5 02-22 00:16:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[83c6 02-22 00:16:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[83c7 02-22 00:16:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[83c8 02-22 00:16:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[83c9 02-22 00:16:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b 52 79 84 f0 dd 4a f4 f6 57 12 8b 48 67 20 c1 |.Ry...J..W..Hg .|
00000010 2e 10 4e 7c 19 60 a8 bb cb e0 03 1d c0 8e 38 9e |..N|.`........8.|
[83ca 02-22 00:16:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 6a 08 95 ac 7a 46 75 6f 44 da 5a |0D. }j...zFuoD.Z|
00000010 c3 5d cc 40 08 e3 06 5b e6 fd 88 53 31 9f 3b 97 |.].@...[...S1.;.|
00000020 bd 5b 33 9c 02 20 6d 4f 8a cd 9c 64 0e 16 a9 d5 |.[3.. mO...d....|
00000030 c3 ed 76 c5 f0 27 42 05 86 f9 8a 12 a7 ff cd 2a |..v..'B........*|
00000040 7f a4 85 72 db 19 |...r..|
[83cb 02-22 00:16:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[83cc 02-22 00:16:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b8bb30 gate 1582330590624615000 evaluation starts
[83cd 02-22 00:16:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b8bb30 signed by 0 principal evaluation starts (used [false])
[83ce 02-22 00:16:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b8bb30 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[83cf 02-22 00:16:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b8bb30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[83d0 02-22 00:16:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b8bb30 principal evaluation fails
[83d1 02-22 00:16:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b8bb30 gate 1582330590624615000 evaluation fails
[83d2 02-22 00:16:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[83d3 02-22 00:16:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[83d4 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[83d5 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b 52 79 84 f0 dd 4a f4 f6 57 12 8b 48 67 20 c1 |.Ry...J..W..Hg .|
00000010 2e 10 4e 7c 19 60 a8 bb cb e0 03 1d c0 8e 38 9e |..N|.`........8.|
[83d6 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 6a 08 95 ac 7a 46 75 6f 44 da 5a |0D. }j...zFuoD.Z|
00000010 c3 5d cc 40 08 e3 06 5b e6 fd 88 53 31 9f 3b 97 |.].@...[...S1.;.|
00000020 bd 5b 33 9c 02 20 6d 4f 8a cd 9c 64 0e 16 a9 d5 |.[3.. mO...d....|
00000030 c3 ed 76 c5 f0 27 42 05 86 f9 8a 12 a7 ff cd 2a |..v..'B........*|
00000040 7f a4 85 72 db 19 |...r..|
[83d7 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[83d8 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3a430 gate 1582330590631853200 evaluation starts
[83d9 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3a430 signed by 0 principal evaluation starts (used [false])
[83da 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3a430 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[83db 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3a430 principal evaluation succeeds for identity 0
[83dc 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3a430 gate 1582330590631853200 evaluation succeeds
[83dd 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[83de 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[83df 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[83e0 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[83e1 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes
[83e2 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes]}
[83e3 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:90
[83e4 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:90
[83e5 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:89 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[83e6 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[83e7 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[83e8 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[83e9 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[83ea 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[83eb 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[83ec 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[83ed 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[83ee 02-22 00:16:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[83ef 02-22 00:16:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[83f0 02-22 00:16:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[83f1 02-22 00:16:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[83f2 02-22 00:16:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[83f3 02-22 00:16:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[83f4 02-22 00:16:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[83f5 02-22 00:16:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[83f6 02-22 00:16:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[83f7 02-22 00:16:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[83f8 02-22 00:16:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[83f9 02-22 00:16:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[83fa 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[83fb 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[83fc 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[83fd 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[83fe 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[83ff 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8400 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8401 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8402 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8403 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[8404 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[8405 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8406 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e274e0 gate 1582330590940978300 evaluation starts
[8407 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e274e0 signed by 0 principal evaluation starts (used [false])
[8408 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e274e0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8409 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e274e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[840a 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e274e0 principal evaluation fails
[840b 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e274e0 gate 1582330590940978300 evaluation fails
[840c 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[840d 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[840e 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[840f 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[8410 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[8411 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8412 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e27de0 gate 1582330590941452000 evaluation starts
[8413 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e27de0 signed by 0 principal evaluation starts (used [false])
[8414 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e27de0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8415 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e27de0 principal evaluation succeeds for identity 0
[8416 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e27de0 gate 1582330590941452000 evaluation succeeds
[8417 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8418 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8419 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[841a 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[841b 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 bb f9 b3 ae 00 00 35 24 2f dd 01 a1 9c da |........5$/.....|
00000010 b8 7f 78 86 f1 13 01 38 9e 43 2c 9a 0b 7f 81 7c |..x....8.C,....||
[841c 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae ef 65 ca 50 56 7d 82 bf 1b 33 |0E.!...e.PV}...3|
00000010 82 6c c3 71 1b f1 c2 20 4b a1 36 7c 0d 4c ff 33 |.l.q... K.6|.L.3|
00000020 dd 20 f8 dc 1b 02 20 5d 61 08 72 e0 77 a4 af 78 |. .... ]a.r.w..x|
00000030 36 f3 f9 99 83 58 00 26 0e b3 e0 ce f7 5d e8 9b |6....X.&.....]..|
00000040 b3 e8 92 8b 7f 34 50 |.....4P|
[841d 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[841e 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[841f 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8420 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8421 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8422 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8423 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8424 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8425 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8426 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8427 02-22 00:16:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[8428 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8429 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[842a 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[842b 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[842c 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f68610 gate 1582330590943971000 evaluation starts
[842d 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f68610 signed by 0 principal evaluation starts (used [false])
[842e 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f68610 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[842f 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f68610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8430 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f68610 principal evaluation fails
[8431 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f68610 gate 1582330590943971000 evaluation fails
[8432 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8433 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8434 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8435 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[8436 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[8437 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8438 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f68f10 gate 1582330590947002300 evaluation starts
[8439 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f68f10 signed by 0 principal evaluation starts (used [false])
[843a 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f68f10 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[843b 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f68f10 principal evaluation succeeds for identity 0
[843c 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f68f10 gate 1582330590947002300 evaluation succeeds
[843d 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[843e 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[843f 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8440 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8441 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8442 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[8443 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8444 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8445 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8446 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8447 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8448 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8449 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[844a 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[844b 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[844c 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[844d 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[844e 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[844f 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f12a80 gate 1582330590948407400 evaluation starts
[8450 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f12a80 signed by 0 principal evaluation starts (used [false])
[8451 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f12a80 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8452 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f12a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8453 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f12a80 principal evaluation fails
[8454 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f12a80 gate 1582330590948407400 evaluation fails
[8455 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8456 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8457 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8458 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[8459 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[845a 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[845b 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f13390 gate 1582330590948942900 evaluation starts
[845c 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f13390 signed by 0 principal evaluation starts (used [false])
[845d 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f13390 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[845e 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f13390 principal evaluation succeeds for identity 0
[845f 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f13390 gate 1582330590948942900 evaluation succeeds
[8460 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8461 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8462 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8463 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8464 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 bb f9 b3 ae 00 00 35 24 2f dd 01 a1 9c da |........5$/.....|
00000010 b8 7f 78 86 f1 13 01 38 9e 43 2c 9a 0b 7f 81 7c |..x....8.C,....||
[8465 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae ef 65 ca 50 56 7d 82 bf 1b 33 |0E.!...e.PV}...3|
00000010 82 6c c3 71 1b f1 c2 20 4b a1 36 7c 0d 4c ff 33 |.l.q... K.6|.L.3|
00000020 dd 20 f8 dc 1b 02 20 5d 61 08 72 e0 77 a4 af 78 |. .... ]a.r.w..x|
00000030 36 f3 f9 99 83 58 00 26 0e b3 e0 ce f7 5d e8 9b |6....X.&.....]..|
00000040 b3 e8 92 8b 7f 34 50 |.....4P|
[8466 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[8467 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[8468 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8469 02-22 00:16:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[846a 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[846b 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[846c 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[846d 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[846e 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[846f 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8470 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[8471 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[8472 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8473 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003417b90 gate 1582330590950536500 evaluation starts
[8474 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003417b90 signed by 0 principal evaluation starts (used [false])
[8475 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003417b90 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8476 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003417b90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8477 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003417b90 principal evaluation fails
[8478 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003417b90 gate 1582330590950536500 evaluation fails
[8479 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[847a 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[847b 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[847c 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[847d 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[847e 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[847f 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003428490 gate 1582330590951046900 evaluation starts
[8480 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003428490 signed by 0 principal evaluation starts (used [false])
[8481 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003428490 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8482 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003428490 principal evaluation succeeds for identity 0
[8483 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003428490 gate 1582330590951046900 evaluation succeeds
[8484 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8485 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8486 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8487 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8488 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8489 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[848a 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[848b 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[848c 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 bb f9 b3 ae 00 00 35 24 2f dd 01 a1 9c da |........5$/.....|
00000010 b8 7f 78 86 f1 13 01 38 9e 43 2c 9a 0b 7f 81 7c |..x....8.C,....||
[848d 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae ef 65 ca 50 56 7d 82 bf 1b 33 |0E.!...e.PV}...3|
00000010 82 6c c3 71 1b f1 c2 20 4b a1 36 7c 0d 4c ff 33 |.l.q... K.6|.L.3|
00000020 dd 20 f8 dc 1b 02 20 5d 61 08 72 e0 77 a4 af 78 |. .... ]a.r.w..x|
00000030 36 f3 f9 99 83 58 00 26 0e b3 e0 ce f7 5d e8 9b |6....X.&.....]..|
00000040 b3 e8 92 8b 7f 34 50 |.....4P|
[848e 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[848f 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8490 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8491 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8492 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8493 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8494 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8495 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8496 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[8497 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[8498 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8499 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344ae90 gate 1582330590953600000 evaluation starts
[849a 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344ae90 signed by 0 principal evaluation starts (used [false])
[849b 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344ae90 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[849c 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344ae90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[849d 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344ae90 principal evaluation fails
[849e 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344ae90 gate 1582330590953600000 evaluation fails
[849f 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[84a0 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[84a1 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[84a2 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[84a3 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[84a4 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[84a5 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344b790 gate 1582330590954010800 evaluation starts
[84a6 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344b790 signed by 0 principal evaluation starts (used [false])
[84a7 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344b790 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[84a8 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344b790 principal evaluation succeeds for identity 0
[84a9 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344b790 gate 1582330590954010800 evaluation succeeds
[84aa 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[84ab 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[84ac 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[84ad 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[84ae 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84af 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84b0 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[84b1 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[84b2 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[84b3 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[84b4 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[84b5 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[84b6 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[84b7 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[84b8 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[84b9 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345d200 gate 1582330590954764200 evaluation starts
[84ba 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345d200 signed by 0 principal evaluation starts (used [false])
[84bb 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345d200 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[84bc 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345d200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[84bd 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345d200 principal evaluation fails
[84be 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345d200 gate 1582330590954764200 evaluation fails
[84bf 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[84c0 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[84c1 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[84c2 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[84c3 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[84c4 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[84c5 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345db00 gate 1582330590955149500 evaluation starts
[84c6 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345db00 signed by 0 principal evaluation starts (used [false])
[84c7 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345db00 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[84c8 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345db00 principal evaluation succeeds for identity 0
[84c9 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345db00 gate 1582330590955149500 evaluation succeeds
[84ca 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[84cb 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[84cc 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[84cd 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[84ce 02-22 00:16:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[84cf 02-22 00:16:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84d0 02-22 00:16:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84d1 02-22 00:16:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[84d2 02-22 00:16:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84d3 02-22 00:16:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84d4 02-22 00:16:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12119395351442832981 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[84d5 02-22 00:16:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:12119395351442832981 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[84d6 02-22 00:16:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[84d7 02-22 00:16:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12119395351442832981 , Msg_type: BLOCK_MSG, digests: [5 6 7 8 1 2 3 4], Envelope: 58 bytes, Signature: 0 bytes
[84d8 02-22 00:16:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12119395351442832981 , Msg_type: BLOCK_MSG, digests: [5 6 7 8 1 2 3 4], Envelope: 58 bytes, Signature: 0 bytes
[84d9 02-22 00:16:31.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[84da 02-22 00:16:31.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[84db 02-22 00:16:31.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84dc 02-22 00:16:31.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84dd 02-22 00:16:31.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[84de 02-22 00:16:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14472680201654756972 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[84df 02-22 00:16:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:14472680201654756972 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[84e0 02-22 00:16:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 6 7 8 1 2 3 4] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[84e1 02-22 00:16:31.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[84e2 02-22 00:16:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[84e3 02-22 00:16:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84e4 02-22 00:16:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84e5 02-22 00:16:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84e6 02-22 00:16:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[84e7 02-22 00:16:32.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[84e8 02-22 00:16:32.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[84e9 02-22 00:16:32.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84ea 02-22 00:16:32.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84eb 02-22 00:16:32.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84ec 02-22 00:16:32.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[84ed 02-22 00:16:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:422441684334087409 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[84ee 02-22 00:16:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:422441684334087409 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[84ef 02-22 00:16:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84f0 02-22 00:16:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84f1 02-22 00:16:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84f2 02-22 00:16:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84f3 02-22 00:16:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84f4 02-22 00:16:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[84f5 02-22 00:16:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[84f6 02-22 00:16:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[84f7 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[84f8 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[84f9 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[84fa 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[84fb 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 21 c6 80 2b 96 4f eb c5 af 6c 99 f9 9c 65 16 84 |!..+.O...l...e..|
00000010 33 b1 7d 14 90 f2 02 d1 e9 69 47 f6 9e 8d cf 78 |3.}......iG....x|
[84fc 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 cb 36 37 81 8c 5e ef 3b 4b d8 d5 |0D. h.67..^.;K..|
00000010 d3 55 65 3f 7b 00 e0 21 00 57 43 58 b0 0b 0d d0 |.Ue?{..!.WCX....|
00000020 7d 87 0e 72 02 20 2c 2e 9f 9c 68 7c f7 90 2d 63 |}..r. ,...h|..-c|
00000030 a1 06 76 cf eb e0 7b 81 85 36 b2 ce de 39 e8 27 |..v...{..6...9.'|
00000040 53 c8 22 94 cf a2 |S."...|
[84fd 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[84fe 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd 04 94 ad 5f 6c 70 be 58 7e 08 |0E.!....._lp.X~.|
00000010 6a 6b a2 3f 5c 11 b4 94 11 36 17 6f 68 85 3d be |jk.?\....6.oh.=.|
00000020 4c 8c 4f a3 2d 02 20 6f 9a df 54 50 98 3f 04 cf |L.O.-. o..TP.?..|
00000030 e8 66 9f b2 06 12 ec c3 14 0d 6d b4 54 70 2c e8 |.f........m.Tp,.|
00000040 fa ce 33 54 0a 18 88 |..3T...|
[84ff 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8500 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[8501 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:94
[8502 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:94
[8503 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[8504 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8505 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8506 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8507 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8508 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8509 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[850a 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[850b 02-22 00:16:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[850c 02-22 00:16:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[850d 02-22 00:16:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[850e 02-22 00:16:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[850f 02-22 00:16:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8510 02-22 00:16:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8511 02-22 00:16:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8512 02-22 00:16:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8513 02-22 00:16:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8514 02-22 00:16:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8515 02-22 00:16:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8516 02-22 00:16:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8517 02-22 00:16:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8518 02-22 00:16:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8519 02-22 00:16:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[851a 02-22 00:16:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes
[851b 02-22 00:16:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes
[851c 02-22 00:16:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[851d 02-22 00:16:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes
[851e 02-22 00:16:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[851f 02-22 00:16:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8520 02-22 00:16:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8521 02-22 00:16:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8522 02-22 00:16:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8523 02-22 00:16:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8524 02-22 00:16:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8525 02-22 00:16:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8526 02-22 00:16:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 2d b7 6b 4f bf 95 c5 38 46 c2 ad 24 70 fd 37 |.-.kO...8F..$p.7|
00000010 e6 6d bb df e5 2c f1 1d 09 35 42 8a 55 2c 18 8a |.m...,...5B.U,..|
[8527 02-22 00:16:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 d9 80 21 24 51 27 5c 6d 05 0c 73 |0D. ...!$Q'\m..s|
00000010 12 fb 0d c3 1d 60 9f 33 21 06 61 f0 8d c9 6a f9 |.....`.3!.a...j.|
00000020 17 ad e4 c4 02 20 0c 81 86 8a 9e 82 98 de dc 89 |..... ..........|
00000030 da b7 12 f9 a5 02 5d 2d 7c 68 09 d7 17 22 7c ab |......]-|h..."|.|
00000040 08 af 88 5e 46 54 |...^FT|
[8528 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8529 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4220 gate 1582330594251121000 evaluation starts
[852a 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4220 signed by 0 principal evaluation starts (used [false])
[852b 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4220 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[852c 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[852d 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4220 principal evaluation fails
[852e 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4220 gate 1582330594251121000 evaluation fails
[852f 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8530 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8531 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8532 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 2d b7 6b 4f bf 95 c5 38 46 c2 ad 24 70 fd 37 |.-.kO...8F..$p.7|
00000010 e6 6d bb df e5 2c f1 1d 09 35 42 8a 55 2c 18 8a |.m...,...5B.U,..|
[8533 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 d9 80 21 24 51 27 5c 6d 05 0c 73 |0D. ...!$Q'\m..s|
00000010 12 fb 0d c3 1d 60 9f 33 21 06 61 f0 8d c9 6a f9 |.....`.3!.a...j.|
00000020 17 ad e4 c4 02 20 0c 81 86 8a 9e 82 98 de dc 89 |..... ..........|
00000030 da b7 12 f9 a5 02 5d 2d 7c 68 09 d7 17 22 7c ab |......]-|h..."|.|
00000040 08 af 88 5e 46 54 |...^FT|
[8534 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8535 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4b20 gate 1582330594253860200 evaluation starts
[8536 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4b20 signed by 0 principal evaluation starts (used [false])
[8537 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4b20 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8538 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4b20 principal evaluation succeeds for identity 0
[8539 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4b20 gate 1582330594253860200 evaluation succeeds
[853a 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[853b 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[853c 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[853d 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[853e 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes
[853f 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes]}
[8540 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:93
[8541 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:93
[8542 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[8543 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8544 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8545 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8546 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8547 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8548 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8549 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[854a 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[854b 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[854c 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[854d 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[854e 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[854f 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[8550 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes
[8551 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8552 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes
[8553 02-22 00:16:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8554 02-22 00:16:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes
[8555 02-22 00:16:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8556 02-22 00:16:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes
[8557 02-22 00:16:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8558 02-22 00:16:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes
[8559 02-22 00:16:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[855a 02-22 00:16:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes
[855b 02-22 00:16:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[855c 02-22 00:16:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[855d 02-22 00:16:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[855e 02-22 00:16:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510231801
[855f 02-22 00:16:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6A118D77B04EA75CDD5318FAAC9449F45A8BD583F02E9C2DD9EE5224B47A07FA
[8560 02-22 00:16:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[8561 02-22 00:16:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8562 02-22 00:16:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8563 02-22 00:16:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8564 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8565 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:35 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[8566 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8567 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8568 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:35 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[8569 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[856a 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:95 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[856b 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[856c 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:95 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[856d 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[856e 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 22 89 a4 e3 c0 cb 7f c4 8c 48 fd 9c d8 f1 99 |."........H.....|
00000010 ad 3b 96 f3 b7 9d 7d e1 1a 0a 3c 9e cf 31 41 f4 |.;....}...<..1A.|
[856f 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 90 35 e2 25 35 da 0a 6e f2 44 1c |0D. E.5.%5..n.D.|
00000010 ed 60 be 39 dd 95 e7 92 71 bc 60 98 37 7a 0a 49 |.`.9....q.`.7z.I|
00000020 3d e8 f7 bd 02 20 2d 0d a2 61 5d ca 01 29 de 1f |=.... -..a]..)..|
00000030 f3 b5 5b a7 39 18 bf 22 e1 9b 18 a8 a3 41 25 49 |..[.9..".....A%I|
00000040 1b 79 65 45 84 0b |.yeE..|
[8570 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[8571 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 82 d0 91 67 65 61 25 83 af 06 93 |0D. ....gea%....|
00000010 c7 d7 d0 77 11 ad 51 81 b4 de 81 75 62 ad b6 d4 |...w..Q....ub...|
00000020 8f 2e a0 d7 02 20 43 95 34 a2 2a f9 d4 df 8f 04 |..... C.4.*.....|
00000030 96 a3 a4 60 9a 71 fd 6c 21 7d ba b4 e2 c5 2c 1b |...`.q.l!}....,.|
00000040 90 e1 f0 8b 3f 47 |....?G|
[8572 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:95 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[8573 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:95 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[8574 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:95
[8575 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:95
[8576 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[8577 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8578 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8579 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[857a 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[857b 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[857c 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[857d 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[857e 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[857f 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[8580 02-22 00:16:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8581 02-22 00:16:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:4895930279667849306 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8582 02-22 00:16:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:4895930279667849306 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8583 02-22 00:16:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[8584 02-22 00:16:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8585 02-22 00:16:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:1876039826556435464 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8586 02-22 00:16:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:1876039826556435464 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8587 02-22 00:16:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1876039826556435464 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8588 02-22 00:16:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8589 02-22 00:16:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[858a 02-22 00:16:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[858b 02-22 00:16:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[858c 02-22 00:16:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[858d 02-22 00:16:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[858e 02-22 00:16:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[858f 02-22 00:16:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8590 02-22 00:16:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[8591 02-22 00:16:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:10359745044377651253 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[8592 02-22 00:16:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[8593 02-22 00:16:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:12916486651887948817 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[8594 02-22 00:16:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[8595 02-22 00:16:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7834235878141246723 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[8596 02-22 00:16:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7834235878141246723 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8597 02-22 00:16:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8598 02-22 00:16:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:10359745044377651253 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8599 02-22 00:16:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:12916486651887948817 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[859a 02-22 00:16:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[859b 02-22 00:16:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[859c 02-22 00:16:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7834235878141246723 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[859d 02-22 00:16:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7834235878141246723 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[859e 02-22 00:16:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[859f 02-22 00:16:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10359745044377651253 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[85a0 02-22 00:16:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10359745044377651253 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[85a1 02-22 00:16:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10359745044377651253 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09], Envelope: 154 bytes, Signature: 0 bytes
[85a2 02-22 00:16:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[85a3 02-22 00:16:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12916486651887948817 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[85a4 02-22 00:16:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12916486651887948817 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[85a5 02-22 00:16:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[85a6 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[85a7 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[85a8 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[85a9 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[85aa 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[85ab 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[85ac 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[85ad 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[85ae 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[85af 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[85b0 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[85b1 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[85b2 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 40 81 a2 de 55 c3 b8 55 0b e4 89 57 e3 bd 4d |.@...U..U...W..M|
00000010 bd 8b 2f 9e 0f bc f6 4b 4c 5a ff 95 53 76 f5 3f |../....KLZ..Sv.?|
[85b3 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 fa e3 d6 34 34 28 60 98 0e 56 fe |0D. c...44(`..V.|
00000010 5d 77 47 e6 8c 6d 88 5a c4 29 2d 40 bf 4f be a5 |]wG..m.Z.)-@.O..|
00000020 76 49 cf 8a 02 20 70 0a 40 01 79 3a 4c f2 45 5d |vI... p.@.y:L.E]|
00000030 82 27 98 1b 3c a6 e9 66 db c4 74 17 a8 f1 87 5a |.'..<..f..t....Z|
00000040 44 bd f8 50 04 a3 |D..P..|
[85b4 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[85b5 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352e470 gate 1582330594471215400 evaluation starts
[85b6 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352e470 signed by 0 principal evaluation starts (used [false])
[85b7 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352e470 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[85b8 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352e470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[85b9 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352e470 principal evaluation fails
[85ba 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352e470 gate 1582330594471215400 evaluation fails
[85bb 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[85bc 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[85bd 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[85be 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 40 81 a2 de 55 c3 b8 55 0b e4 89 57 e3 bd 4d |.@...U..U...W..M|
00000010 bd 8b 2f 9e 0f bc f6 4b 4c 5a ff 95 53 76 f5 3f |../....KLZ..Sv.?|
[85bf 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 fa e3 d6 34 34 28 60 98 0e 56 fe |0D. c...44(`..V.|
00000010 5d 77 47 e6 8c 6d 88 5a c4 29 2d 40 bf 4f be a5 |]wG..m.Z.)-@.O..|
00000020 76 49 cf 8a 02 20 70 0a 40 01 79 3a 4c f2 45 5d |vI... p.@.y:L.E]|
00000030 82 27 98 1b 3c a6 e9 66 db c4 74 17 a8 f1 87 5a |.'..<..f..t....Z|
00000040 44 bd f8 50 04 a3 |D..P..|
[85c0 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[85c1 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352ed70 gate 1582330594471649200 evaluation starts
[85c2 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352ed70 signed by 0 principal evaluation starts (used [false])
[85c3 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352ed70 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[85c4 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352ed70 principal evaluation succeeds for identity 0
[85c5 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352ed70 gate 1582330594471649200 evaluation succeeds
[85c6 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[85c7 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[85c8 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[85c9 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[85ca 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[85cb 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes]}
[85cc 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:94
[85cd 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:94
[85ce 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[85cf 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[85d0 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[85d1 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[85d2 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[85d3 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[85d4 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[85d5 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[85d6 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers
[85d7 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[85d8 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[85d9 02-22 00:16:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[85da 02-22 00:16:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15105A
[85db 02-22 00:16:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 72AB1F8C998FCE9EEE8F80B275C73EBEEBD481DC4213CC593A62DD26CBE01053
[85dc 02-22 00:16:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[85dd 02-22 00:16:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[85de 02-22 00:16:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[85df 02-22 00:16:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[85e0 02-22 00:16:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers
[85e1 02-22 00:16:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[85e2 02-22 00:16:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[85e3 02-22 00:16:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[85e4 02-22 00:16:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[85e5 02-22 00:16:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[85e6 02-22 00:16:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[85e7 02-22 00:16:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[85e8 02-22 00:16:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[85e9 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[85ea 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[85eb 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[85ec 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[85ed 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 ab 1f 8c 99 8f ce 9e ee 8f 80 b2 75 c7 3e be |r...........u.>.|
00000010 eb d4 81 dc 42 13 cc 59 3a 62 dd 26 cb e0 10 53 |....B..Y:b.&...S|
[85ee 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 db a3 a9 57 81 e5 8f 3b ba e3 85 |0D. 7...W...;...|
00000010 8a 0c cb e5 a5 66 14 cc 78 92 36 52 39 87 4d d6 |.....f..x.6R9.M.|
00000020 c9 85 34 99 02 20 42 e6 b2 c9 1d 20 96 0f 10 88 |..4.. B.... ....|
00000030 83 57 91 26 f9 6e 95 a1 c4 91 42 90 a6 3f 9c ef |.W.&.n....B..?..|
00000040 f8 71 42 28 f9 60 |.qB(.`|
[85ef 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes
[85f0 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes
[85f1 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[85f2 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[85f3 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 22 89 a4 e3 c0 cb 7f c4 8c 48 fd 9c d8 f1 99 |."........H.....|
00000010 ad 3b 96 f3 b7 9d 7d e1 1a 0a 3c 9e cf 31 41 f4 |.;....}...<..1A.|
[85f4 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 90 35 e2 25 35 da 0a 6e f2 44 1c |0D. E.5.%5..n.D.|
00000010 ed 60 be 39 dd 95 e7 92 71 bc 60 98 37 7a 0a 49 |.`.9....q.`.7z.I|
00000020 3d e8 f7 bd 02 20 2d 0d a2 61 5d ca 01 29 de 1f |=.... -..a]..)..|
00000030 f3 b5 5b a7 39 18 bf 22 e1 9b 18 a8 a3 41 25 49 |..[.9..".....A%I|
00000040 1b 79 65 45 84 0b |.yeE..|
[85f5 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:95 , Envelope: 83 bytes, Signature: 70 bytes
[85f6 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[85f7 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[85f8 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[85f9 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[85fa 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[85fb 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[85fc 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[85fd 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[85fe 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[85ff 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 40 81 a2 de 55 c3 b8 55 0b e4 89 57 e3 bd 4d |.@...U..U...W..M|
00000010 bd 8b 2f 9e 0f bc f6 4b 4c 5a ff 95 53 76 f5 3f |../....KLZ..Sv.?|
[8600 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 fa e3 d6 34 34 28 60 98 0e 56 fe |0D. c...44(`..V.|
00000010 5d 77 47 e6 8c 6d 88 5a c4 29 2d 40 bf 4f be a5 |]wG..m.Z.)-@.O..|
00000020 76 49 cf 8a 02 20 70 0a 40 01 79 3a 4c f2 45 5d |vI... p.@.y:L.E]|
00000030 82 27 98 1b 3c a6 e9 66 db c4 74 17 a8 f1 87 5a |.'..<..f..t....Z|
00000040 44 bd f8 50 04 a3 |D..P..|
[8601 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8602 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003582010 gate 1582330594555674300 evaluation starts
[8603 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003582010 signed by 0 principal evaluation starts (used [false])
[8604 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003582010 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8605 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003582010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8606 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003582010 principal evaluation fails
[8607 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003582010 gate 1582330594555674300 evaluation fails
[8608 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8609 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[860a 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[860b 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 40 81 a2 de 55 c3 b8 55 0b e4 89 57 e3 bd 4d |.@...U..U...W..M|
00000010 bd 8b 2f 9e 0f bc f6 4b 4c 5a ff 95 53 76 f5 3f |../....KLZ..Sv.?|
[860c 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 fa e3 d6 34 34 28 60 98 0e 56 fe |0D. c...44(`..V.|
00000010 5d 77 47 e6 8c 6d 88 5a c4 29 2d 40 bf 4f be a5 |]wG..m.Z.)-@.O..|
00000020 76 49 cf 8a 02 20 70 0a 40 01 79 3a 4c f2 45 5d |vI... p.@.y:L.E]|
00000030 82 27 98 1b 3c a6 e9 66 db c4 74 17 a8 f1 87 5a |.'..<..f..t....Z|
00000040 44 bd f8 50 04 a3 |D..P..|
[860d 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[860e 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003582910 gate 1582330594556235400 evaluation starts
[860f 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003582910 signed by 0 principal evaluation starts (used [false])
[8610 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003582910 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8611 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003582910 principal evaluation succeeds for identity 0
[8612 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003582910 gate 1582330594556235400 evaluation succeeds
[8613 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8614 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8615 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8616 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8617 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8618 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8619 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[861a 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[861b 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[861c 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[861d 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes
[861e 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[861f 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 22 89 a4 e3 c0 cb 7f c4 8c 48 fd 9c d8 f1 99 |."........H.....|
00000010 ad 3b 96 f3 b7 9d 7d e1 1a 0a 3c 9e cf 31 41 f4 |.;....}...<..1A.|
[8620 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 90 35 e2 25 35 da 0a 6e f2 44 1c |0D. E.5.%5..n.D.|
00000010 ed 60 be 39 dd 95 e7 92 71 bc 60 98 37 7a 0a 49 |.`.9....q.`.7z.I|
00000020 3d e8 f7 bd 02 20 2d 0d a2 61 5d ca 01 29 de 1f |=.... -..a]..)..|
00000030 f3 b5 5b a7 39 18 bf 22 e1 9b 18 a8 a3 41 25 49 |..[.9..".....A%I|
00000040 1b 79 65 45 84 0b |.yeE..|
[8621 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:95 , Envelope: 83 bytes, Signature: 70 bytes
[8622 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8623 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[8624 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8625 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8626 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8627 02-22 00:16:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8628 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8629 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[862a 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[862b 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b 52 79 84 f0 dd 4a f4 f6 57 12 8b 48 67 20 c1 |.Ry...J..W..Hg .|
00000010 2e 10 4e 7c 19 60 a8 bb cb e0 03 1d c0 8e 38 9e |..N|.`........8.|
[862c 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 6a 08 95 ac 7a 46 75 6f 44 da 5a |0D. }j...zFuoD.Z|
00000010 c3 5d cc 40 08 e3 06 5b e6 fd 88 53 31 9f 3b 97 |.].@...[...S1.;.|
00000020 bd 5b 33 9c 02 20 6d 4f 8a cd 9c 64 0e 16 a9 d5 |.[3.. mO...d....|
00000030 c3 ed 76 c5 f0 27 42 05 86 f9 8a 12 a7 ff cd 2a |..v..'B........*|
00000040 7f a4 85 72 db 19 |...r..|
[862d 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[862e 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035993b0 gate 1582330594560378100 evaluation starts
[862f 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035993b0 signed by 0 principal evaluation starts (used [false])
[8630 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035993b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8631 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035993b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8632 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035993b0 principal evaluation fails
[8633 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035993b0 gate 1582330594560378100 evaluation fails
[8634 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8635 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8636 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8637 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b 52 79 84 f0 dd 4a f4 f6 57 12 8b 48 67 20 c1 |.Ry...J..W..Hg .|
00000010 2e 10 4e 7c 19 60 a8 bb cb e0 03 1d c0 8e 38 9e |..N|.`........8.|
[8638 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 6a 08 95 ac 7a 46 75 6f 44 da 5a |0D. }j...zFuoD.Z|
00000010 c3 5d cc 40 08 e3 06 5b e6 fd 88 53 31 9f 3b 97 |.].@...[...S1.;.|
00000020 bd 5b 33 9c 02 20 6d 4f 8a cd 9c 64 0e 16 a9 d5 |.[3.. mO...d....|
00000030 c3 ed 76 c5 f0 27 42 05 86 f9 8a 12 a7 ff cd 2a |..v..'B........*|
00000040 7f a4 85 72 db 19 |...r..|
[8639 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[863a 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003599cb0 gate 1582330594560835000 evaluation starts
[863b 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003599cb0 signed by 0 principal evaluation starts (used [false])
[863c 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003599cb0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[863d 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003599cb0 principal evaluation succeeds for identity 0
[863e 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003599cb0 gate 1582330594560835000 evaluation succeeds
[863f 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8640 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8641 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8642 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8643 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes
[8644 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8645 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[8646 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 ab 1f 8c 99 8f ce 9e ee 8f 80 b2 75 c7 3e be |r...........u.>.|
00000010 eb d4 81 dc 42 13 cc 59 3a 62 dd 26 cb e0 10 53 |....B..Y:b.&...S|
[8647 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 db a3 a9 57 81 e5 8f 3b ba e3 85 |0D. 7...W...;...|
00000010 8a 0c cb e5 a5 66 14 cc 78 92 36 52 39 87 4d d6 |.....f..x.6R9.M.|
00000020 c9 85 34 99 02 20 42 e6 b2 c9 1d 20 96 0f 10 88 |..4.. B.... ....|
00000030 83 57 91 26 f9 6e 95 a1 c4 91 42 90 a6 3f 9c ef |.W.&.n....B..?..|
00000040 f8 71 42 28 f9 60 |.qB(.`|
[8648 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes
[8649 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes
[864a 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[864b 02-22 00:16:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[864c 02-22 00:16:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[864d 02-22 00:16:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[864e 02-22 00:16:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[864f 02-22 00:16:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[8650 02-22 00:16:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 ab 1f 8c 99 8f ce 9e ee 8f 80 b2 75 c7 3e be |r...........u.>.|
00000010 eb d4 81 dc 42 13 cc 59 3a 62 dd 26 cb e0 10 53 |....B..Y:b.&...S|
[8651 02-22 00:16:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 db a3 a9 57 81 e5 8f 3b ba e3 85 |0D. 7...W...;...|
00000010 8a 0c cb e5 a5 66 14 cc 78 92 36 52 39 87 4d d6 |.....f..x.6R9.M.|
00000020 c9 85 34 99 02 20 42 e6 b2 c9 1d 20 96 0f 10 88 |..4.. B.... ....|
00000030 83 57 91 26 f9 6e 95 a1 c4 91 42 90 a6 3f 9c ef |.W.&.n....B..?..|
00000040 f8 71 42 28 f9 60 |.qB(.`|
[8652 02-22 00:16:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[8653 02-22 00:16:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 a4 4a 77 3e 81 0c b6 05 84 54 79 |0D. ..Jw>.....Ty|
00000010 0e 8e 7f ab a8 ee 91 b5 79 43 3d 93 8b d2 f9 42 |........yC=....B|
00000020 bd f4 74 b8 02 20 48 6b a1 1d 6a f3 02 23 47 d4 |..t.. Hk..j..#G.|
00000030 30 d3 b7 3b e3 e5 3b 35 6d d6 72 39 b4 ca 95 4d |0..;..;5m.r9...M|
00000040 71 37 a6 51 85 43 |q7.Q.C|
[8654 02-22 00:16:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[8655 02-22 00:16:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[8656 02-22 00:16:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8657 02-22 00:16:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8658 02-22 00:16:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[8659 02-22 00:16:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[865a 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[865b 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[865c 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[865d 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[865e 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[865f 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8660 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8661 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8662 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8663 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d cf 7c c6 d9 03 29 1c 34 c8 85 72 d6 63 1c 87 |..|...).4..r.c..|
00000010 98 1d dd 31 38 4a fa bb 5a 85 78 85 12 2a 1e 9d |...18J..Z.x..*..|
[8664 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 3f ed e2 50 fc 27 46 d2 d3 03 |0E.!..?..P.'F...|
00000010 72 e3 a0 c0 c8 95 0a f6 13 58 2d 4c dd 40 9d b6 |r........X-L.@..|
00000020 23 d8 d5 4f 7d 02 20 7c 9f 80 c7 69 14 a5 03 20 |#..O}. |...i... |
00000030 67 e6 60 dd 48 33 86 25 48 dd 0e ca f0 64 ad ea |g.`.H3.%H....d..|
00000040 9b 72 98 95 33 da 69 |.r..3.i|
[8665 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8666 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035dbe20 gate 1582330594635358100 evaluation starts
[8667 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035dbe20 signed by 0 principal evaluation starts (used [false])
[8668 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035dbe20 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8669 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035dbe20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[866a 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035dbe20 principal evaluation fails
[866b 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035dbe20 gate 1582330594635358100 evaluation fails
[866c 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[866d 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[866e 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[866f 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d cf 7c c6 d9 03 29 1c 34 c8 85 72 d6 63 1c 87 |..|...).4..r.c..|
00000010 98 1d dd 31 38 4a fa bb 5a 85 78 85 12 2a 1e 9d |...18J..Z.x..*..|
[8670 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 3f ed e2 50 fc 27 46 d2 d3 03 |0E.!..?..P.'F...|
00000010 72 e3 a0 c0 c8 95 0a f6 13 58 2d 4c dd 40 9d b6 |r........X-L.@..|
00000020 23 d8 d5 4f 7d 02 20 7c 9f 80 c7 69 14 a5 03 20 |#..O}. |...i... |
00000030 67 e6 60 dd 48 33 86 25 48 dd 0e ca f0 64 ad ea |g.`.H3.%H....d..|
00000040 9b 72 98 95 33 da 69 |.r..3.i|
[8671 02-22 00:16:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8672 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f4720 gate 1582330594640463300 evaluation starts
[8673 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f4720 signed by 0 principal evaluation starts (used [false])
[8674 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f4720 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8675 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f4720 principal evaluation succeeds for identity 0
[8676 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f4720 gate 1582330594640463300 evaluation succeeds
[8677 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8678 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8679 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[867a 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[867b 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes
[867c 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes]}
[867d 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:91
[867e 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:91
[867f 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:90 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[8680 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8681 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8682 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8683 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[8684 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8685 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8686 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8687 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[8688 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[8689 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[868a 02-22 00:16:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[868b 02-22 00:16:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15105B
[868c 02-22 00:16:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC3150CE62E037FCA9DDB04EDE7F2B9BF3F1FAF20AD2C24E4B2D546FA8B5329B
[868d 02-22 00:16:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[868e 02-22 00:16:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[868f 02-22 00:16:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[8690 02-22 00:16:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8691 02-22 00:16:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8692 02-22 00:16:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8693 02-22 00:16:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[8694 02-22 00:16:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[8695 02-22 00:16:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes
[8696 02-22 00:16:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8697 02-22 00:16:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[8698 02-22 00:16:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8699 02-22 00:16:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[869a 02-22 00:16:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[869b 02-22 00:16:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes
[869c 02-22 00:16:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[869d 02-22 00:16:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes
[869e 02-22 00:16:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes
[869f 02-22 00:16:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[86a0 02-22 00:16:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes
[86a1 02-22 00:16:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[86a2 02-22 00:16:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc 31 50 ce 62 e0 37 fc a9 dd b0 4e de 7f 2b 9b |.1P.b.7....N..+.|
00000010 f3 f1 fa f2 0a d2 c2 4e 4b 2d 54 6f a8 b5 32 9b |.......NK-To..2.|
[86a3 02-22 00:16:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 80 5e 6b 0a 61 80 d1 47 60 ca |0E.!...^k.a..G`.|
00000010 51 35 1a 31 50 bb 9d 02 81 1a cc 75 ce 66 2f 50 |Q5.1P......u.f/P|
00000020 a1 70 34 4b 2d 02 20 26 5b 4a 81 fb 30 97 ac 5c |.p4K-. &[J..0..\|
00000030 f5 ca e9 8e cd a5 e8 68 da 2c cf 73 8c 31 28 85 |.......h.,.s.1(.|
00000040 5d af cf 1c d9 b1 4f |].....O|
[86a4 02-22 00:16:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes
[86a5 02-22 00:16:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[86a6 02-22 00:16:34.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[86a7 02-22 00:16:34.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[86a8 02-22 00:16:34.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[86aa 02-22 00:16:34.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[86a9 02-22 00:16:34.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[86ab 02-22 00:16:34.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[86ac 02-22 00:16:34.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[86ad 02-22 00:16:34.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[86ae 02-22 00:16:34.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[86af 02-22 00:16:34.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[86b0 02-22 00:16:34.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[86b1 02-22 00:16:34.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[86b2 02-22 00:16:34.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[86b3 02-22 00:16:34.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[86b4 02-22 00:16:34.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[86b5 02-22 00:16:34.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[86b6 02-22 00:16:34.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[86b7 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[86b8 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[86b9 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[86ba 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[86bb 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[86bc 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fb80 gate 1582330594952420800 evaluation starts
[86bd 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fb80 signed by 0 principal evaluation starts (used [false])
[86be 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fb80 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[86bf 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fb80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[86c0 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fb80 principal evaluation fails
[86c1 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fb80 gate 1582330594952420800 evaluation fails
[86c2 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[86c3 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[86c4 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[86c5 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[86c6 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[86c7 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[86c8 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366c480 gate 1582330594957750000 evaluation starts
[86c9 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366c480 signed by 0 principal evaluation starts (used [false])
[86ca 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366c480 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[86cb 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366c480 principal evaluation succeeds for identity 0
[86cc 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366c480 gate 1582330594957750000 evaluation succeeds
[86cd 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[86ce 02-22 00:16:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[86cf 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[86d0 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[86d1 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 bb f9 b3 ae 00 00 35 24 2f dd 01 a1 9c da |........5$/.....|
00000010 b8 7f 78 86 f1 13 01 38 9e 43 2c 9a 0b 7f 81 7c |..x....8.C,....||
[86d2 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae ef 65 ca 50 56 7d 82 bf 1b 33 |0E.!...e.PV}...3|
00000010 82 6c c3 71 1b f1 c2 20 4b a1 36 7c 0d 4c ff 33 |.l.q... K.6|.L.3|
00000020 dd 20 f8 dc 1b 02 20 5d 61 08 72 e0 77 a4 af 78 |. .... ]a.r.w..x|
00000030 36 f3 f9 99 83 58 00 26 0e b3 e0 ce f7 5d e8 9b |6....X.&.....]..|
00000040 b3 e8 92 8b 7f 34 50 |.....4P|
[86d3 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[86d4 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[86d5 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[86d6 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[86d7 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[86d8 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[86d9 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[86da 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[86db 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[86dc 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[86dd 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[86de 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[86df 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[86e0 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036bcc70 gate 1582330594968997400 evaluation starts
[86e1 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036bcc70 signed by 0 principal evaluation starts (used [false])
[86e2 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036bcc70 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[86e3 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036bcc70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[86e4 02-22 00:16:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036bcc70 principal evaluation fails
[86e5 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036bcc70 gate 1582330594968997400 evaluation fails
[86e6 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[86e7 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[86e8 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[86e9 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[86ea 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[86eb 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[86ec 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036bd570 gate 1582330594972516400 evaluation starts
[86ed 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036bd570 signed by 0 principal evaluation starts (used [false])
[86ee 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036bd570 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[86ef 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036bd570 principal evaluation succeeds for identity 0
[86f0 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036bd570 gate 1582330594972516400 evaluation succeeds
[86f1 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[86f2 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[86f3 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[86f4 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[86f5 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[86f6 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[86f7 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[86f8 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[86f9 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 bb f9 b3 ae 00 00 35 24 2f dd 01 a1 9c da |........5$/.....|
00000010 b8 7f 78 86 f1 13 01 38 9e 43 2c 9a 0b 7f 81 7c |..x....8.C,....||
[86fa 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae ef 65 ca 50 56 7d 82 bf 1b 33 |0E.!...e.PV}...3|
00000010 82 6c c3 71 1b f1 c2 20 4b a1 36 7c 0d 4c ff 33 |.l.q... K.6|.L.3|
00000020 dd 20 f8 dc 1b 02 20 5d 61 08 72 e0 77 a4 af 78 |. .... ]a.r.w..x|
00000030 36 f3 f9 99 83 58 00 26 0e b3 e0 ce f7 5d e8 9b |6....X.&.....]..|
00000040 b3 e8 92 8b 7f 34 50 |.....4P|
[86fb 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[86fc 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[86fd 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[86fe 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[86ff 02-22 00:16:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8700 02-22 00:16:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8701 02-22 00:16:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8702 02-22 00:16:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8703 02-22 00:16:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[8704 02-22 00:16:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[8705 02-22 00:16:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8706 02-22 00:16:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e3f40 gate 1582330594983067000 evaluation starts
[8707 02-22 00:16:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e3f40 signed by 0 principal evaluation starts (used [false])
[8708 02-22 00:16:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e3f40 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8709 02-22 00:16:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e3f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[870a 02-22 00:16:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e3f40 principal evaluation fails
[870b 02-22 00:16:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e3f40 gate 1582330594983067000 evaluation fails
[870c 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[870d 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[870e 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[870f 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[8710 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[8711 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8712 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fe840 gate 1582330594997577900 evaluation starts
[8713 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fe840 signed by 0 principal evaluation starts (used [false])
[8714 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fe840 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8715 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fe840 principal evaluation succeeds for identity 0
[8716 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fe840 gate 1582330594997577900 evaluation succeeds
[8717 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8718 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8719 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[871a 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[871b 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[871c 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[871d 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[871e 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[871f 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8720 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8721 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8722 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8723 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[8724 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[8725 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8726 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371a2b0 gate 1582330594998564600 evaluation starts
[8727 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371a2b0 signed by 0 principal evaluation starts (used [false])
[8728 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371a2b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8729 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371a2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[872a 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371a2b0 principal evaluation fails
[872b 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371a2b0 gate 1582330594998564600 evaluation fails
[872c 02-22 00:16:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[872d 02-22 00:16:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[872e 02-22 00:16:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[872f 02-22 00:16:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[8730 02-22 00:16:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[8731 02-22 00:16:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8732 02-22 00:16:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371abb0 gate 1582330595008820100 evaluation starts
[8733 02-22 00:16:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371abb0 signed by 0 principal evaluation starts (used [false])
[8734 02-22 00:16:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371abb0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8735 02-22 00:16:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371abb0 principal evaluation succeeds for identity 0
[8736 02-22 00:16:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371abb0 gate 1582330595008820100 evaluation succeeds
[8737 02-22 00:16:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8738 02-22 00:16:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8739 02-22 00:16:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[873a 02-22 00:16:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[873b 02-22 00:16:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[873c 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[873d 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[873e 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[873f 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8740 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8741 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8742 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8743 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8744 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8745 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8746 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8747 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[8748 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[8749 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[874a 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003643ca0 gate 1582330595026364400 evaluation starts
[874b 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003643ca0 signed by 0 principal evaluation starts (used [false])
[874c 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003643ca0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[874d 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003643ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[874e 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003643ca0 principal evaluation fails
[874f 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003643ca0 gate 1582330595026364400 evaluation fails
[8750 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8751 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8752 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8753 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[8754 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[8755 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8756 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376a5a0 gate 1582330595027971500 evaluation starts
[8757 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376a5a0 signed by 0 principal evaluation starts (used [false])
[8758 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376a5a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8759 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376a5a0 principal evaluation succeeds for identity 0
[875a 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376a5a0 gate 1582330595027971500 evaluation succeeds
[875b 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[875c 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[875d 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[875e 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[875f 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 bb f9 b3 ae 00 00 35 24 2f dd 01 a1 9c da |........5$/.....|
00000010 b8 7f 78 86 f1 13 01 38 9e 43 2c 9a 0b 7f 81 7c |..x....8.C,....||
[8760 02-22 00:16:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae ef 65 ca 50 56 7d 82 bf 1b 33 |0E.!...e.PV}...3|
00000010 82 6c c3 71 1b f1 c2 20 4b a1 36 7c 0d 4c ff 33 |.l.q... K.6|.L.3|
00000020 dd 20 f8 dc 1b 02 20 5d 61 08 72 e0 77 a4 af 78 |. .... ]a.r.w..x|
00000030 36 f3 f9 99 83 58 00 26 0e b3 e0 ce f7 5d e8 9b |6....X.&.....]..|
00000040 b3 e8 92 8b 7f 34 50 |.....4P|
[8761 02-22 00:16:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[8762 02-22 00:16:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[8763 02-22 00:16:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8764 02-22 00:16:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8765 02-22 00:16:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8766 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8767 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8768 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8769 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[876a 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[876b 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[876c 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[876d 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[876e 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378cd90 gate 1582330595040718700 evaluation starts
[876f 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378cd90 signed by 0 principal evaluation starts (used [false])
[8770 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378cd90 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8771 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378cd90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8772 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378cd90 principal evaluation fails
[8773 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378cd90 gate 1582330595040718700 evaluation fails
[8774 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8775 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8776 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8777 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[8778 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[8779 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[877a 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378d690 gate 1582330595041247900 evaluation starts
[877b 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378d690 signed by 0 principal evaluation starts (used [false])
[877c 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378d690 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[877d 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378d690 principal evaluation succeeds for identity 0
[877e 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378d690 gate 1582330595041247900 evaluation succeeds
[877f 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8780 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8781 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8782 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8783 02-22 00:16:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8784 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes
[8785 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8786 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes
[8787 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[8788 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8789 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[878a 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[878b 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[878c 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[878d 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[878e 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[878f 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8790 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 38 7c 46 40 07 f5 6b 77 1a 42 0a c6 ff c0 32 |.8|F@..kw.B....2|
00000010 90 37 ab 27 03 c3 ae c1 bb 54 0c 75 84 a9 f2 af |.7.'.....T.u....|
[8791 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8792 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 3a 83 ea 1d 46 5c a2 71 0c 4a f4 |0D. 9:...F\.q.J.|
00000010 ad db a3 86 7f 97 70 25 6e 37 f4 0d 0a ac 1e 4a |......p%n7.....J|
00000020 f6 f8 b5 3b 02 20 2b 58 e5 5f 4d 90 67 b6 af 6c |...;. +X._M.g..l|
00000030 9b 27 88 77 8d 44 0e 56 0c 4e c6 cc 78 8a 2c 17 |.'.w.D.V.N..x.,.|
00000040 33 b2 cc d0 23 d5 |3...#.|
[8793 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[8794 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8795 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8796 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8797 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3500 gate 1582330595133891800 evaluation starts
[8798 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3500 signed by 0 principal evaluation starts (used [false])
[8799 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:1439253952717376315 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[879a 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3500 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[879b 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[879c 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:1439253952717376315 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[879d 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3500 principal evaluation fails
[879e 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[879f 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3500 gate 1582330595133891800 evaluation fails
[87a1 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes
[87a2 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes
[87a0 02-22 00:16:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[87a3 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[87a4 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[87a5 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 38 7c 46 40 07 f5 6b 77 1a 42 0a c6 ff c0 32 |.8|F@..kw.B....2|
00000010 90 37 ab 27 03 c3 ae c1 bb 54 0c 75 84 a9 f2 af |.7.'.....T.u....|
[87a6 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 3a 83 ea 1d 46 5c a2 71 0c 4a f4 |0D. 9:...F\.q.J.|
00000010 ad db a3 86 7f 97 70 25 6e 37 f4 0d 0a ac 1e 4a |......p%n7.....J|
00000020 f6 f8 b5 3b 02 20 2b 58 e5 5f 4d 90 67 b6 af 6c |...;. +X._M.g..l|
00000030 9b 27 88 77 8d 44 0e 56 0c 4e c6 cc 78 8a 2c 17 |.'.w.D.V.N..x.,.|
00000040 33 b2 cc d0 23 d5 |3...#.|
[87a7 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[87a8 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3e00 gate 1582330595146233900 evaluation starts
[87a9 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3e00 signed by 0 principal evaluation starts (used [false])
[87aa 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3e00 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[87ab 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3e00 principal evaluation succeeds for identity 0
[87ac 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3e00 gate 1582330595146233900 evaluation succeeds
[87ad 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[87ae 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[87af 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[87b0 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[87b1 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes
[87b2 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes]}
[87b3 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:92
[87b4 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:92
[87b5 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:91 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[87b6 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87b7 02-22 00:16:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87b8 02-22 00:16:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87b9 02-22 00:16:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87ba 02-22 00:16:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1439253952717376315 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5 6 7 8], Envelope: 57 bytes, Signature: 0 bytes
[87bb 02-22 00:16:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1439253952717376315 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5 6 7 8], Envelope: 57 bytes, Signature: 0 bytes
[87bc 02-22 00:16:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87bd 02-22 00:16:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes
[87be 02-22 00:16:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes
[87bf 02-22 00:16:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87c0 02-22 00:16:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87c1 02-22 00:16:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes
[87c2 02-22 00:16:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87c3 02-22 00:16:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87c4 02-22 00:16:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87c5 02-22 00:16:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87c6 02-22 00:16:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87c7 02-22 00:16:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87c8 02-22 00:16:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87c9 02-22 00:16:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[87ca 02-22 00:16:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87cb 02-22 00:16:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87cc 02-22 00:16:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[87cd 02-22 00:16:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes
[87ce 02-22 00:16:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87cf 02-22 00:16:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes
[87d0 02-22 00:16:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87d1 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[87d2 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87d3 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87d4 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87d5 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87d6 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[87d7 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[87d8 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87d9 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87da 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87db 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87dc 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[87dd 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87de 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87df 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87e0 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15208566791024011269 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[87e1 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:15208566791024011269 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[87e2 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [8 1 2 3 4 5 6 7] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[87e3 02-22 00:16:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87e4 02-22 00:16:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:1022652013352641464 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[87e5 02-22 00:16:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:1022652013352641464 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[87e6 02-22 00:16:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87e7 02-22 00:16:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87e8 02-22 00:16:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87e9 02-22 00:16:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87ea 02-22 00:16:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87eb 02-22 00:16:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[87ec 02-22 00:16:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[87ed 02-22 00:16:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87ee 02-22 00:16:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[87ef 02-22 00:16:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87f0 02-22 00:16:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[87f1 02-22 00:16:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[87f2 02-22 00:16:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 c3 26 93 29 25 74 7c fe b0 6a c7 f0 e4 19 2a |..&.)%t|..j....*|
00000010 0d 6d e8 81 6d c1 63 4d fd 4d fc cb ef 72 cb c8 |.m..m.cM.M...r..|
[87f3 02-22 00:16:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 86 94 f1 6a f0 1a bc c3 21 c1 f7 |0D. /...j....!..|
00000010 c3 84 49 85 1b e8 16 62 f1 97 d4 ac f9 a8 91 f3 |..I....b........|
00000020 14 cb bd 3d 02 20 63 97 4e d1 f0 79 b4 b7 59 45 |...=. c.N..y..YE|
00000030 31 ca 8a 87 4e ef c1 05 34 ed ab fd bd 84 62 24 |1...N...4.....b$|
00000040 d8 16 38 f0 9a 75 |..8..u|
[87f4 02-22 00:16:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[87f5 02-22 00:16:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d f9 ee 8f 8e cb 7c d9 a5 7f 99 01 |0D. ].....|.....|
00000010 00 3e c7 65 a5 c4 1c f6 50 75 45 58 73 90 39 27 |.>.e....PuEXs.9'|
00000020 45 8d e2 ea 02 20 23 fe 38 2b 3f 98 f5 c1 e8 fa |E.... #.8+?.....|
00000030 8d ca f5 9f af 31 19 06 2f 98 73 cc 9f 50 9f 06 |.....1../.s..P..|
00000040 73 ac 1c b7 94 36 |s....6|
[87f6 02-22 00:16:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[87f7 02-22 00:16:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[87f8 02-22 00:16:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:96
[87f9 02-22 00:16:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:96
[87fa 02-22 00:16:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:95 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[87fb 02-22 00:16:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87fc 02-22 00:16:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87fd 02-22 00:16:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[87fe 02-22 00:16:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[87ff 02-22 00:16:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8800 02-22 00:16:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8801 02-22 00:16:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[8802 02-22 00:16:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[8803 02-22 00:16:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[8804 02-22 00:16:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8805 02-22 00:16:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:9189567662089534597 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8806 02-22 00:16:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:9189567662089534597 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8807 02-22 00:16:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[8808 02-22 00:16:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8809 02-22 00:16:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:9714209813081652173 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[880a 02-22 00:16:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:9714209813081652173 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[880b 02-22 00:16:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:9714209813081652173 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[880c 02-22 00:16:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[880d 02-22 00:16:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[880e 02-22 00:16:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[880f 02-22 00:16:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8810 02-22 00:16:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8811 02-22 00:16:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8812 02-22 00:16:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[8813 02-22 00:16:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8814 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[8815 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:3952604518083698322 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[8816 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[8817 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:18383450994425677370 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[8818 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[8819 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:18442565321672507634 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[881a 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:18442565321672507634 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[881b 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[881c 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:3952604518083698322 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[881d 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[881e 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:18383450994425677370 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[881f 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8820 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18442565321672507634 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[8821 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18442565321672507634 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[8822 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8823 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3952604518083698322 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[8824 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3952604518083698322 , Msg_type: IDENTITY_MSG, digests: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[8825 02-22 00:16:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8826 02-22 00:16:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18383450994425677370 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[8827 02-22 00:16:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18383450994425677370 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[8828 02-22 00:16:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18383450994425677370 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[8829 02-22 00:16:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[882a 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:95 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[882b 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:95 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[882c 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[882d 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:95 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[882e 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[882f 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8830 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8831 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8832 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8833 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8834 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8835 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8836 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 0a ab 24 dd d4 88 cd 67 94 8a aa 85 c9 c2 28 |Z..$....g......(|
00000010 bd 0b f0 a3 fd bb 20 62 8c 8d 5b c7 a7 4f 59 0c |...... b..[..OY.|
[8837 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 62 39 00 ad d3 e0 76 41 8d 7c 68 |0D. Fb9....vA.|h|
00000010 35 f2 1b 6d c8 0f 6f 8c 91 f0 fb d2 7b 69 68 07 |5..m..o.....{ih.|
00000020 95 15 e0 1e 02 20 07 60 07 16 ed 8f b8 a1 8f 3a |..... .`.......:|
00000030 9b 16 78 fc ca ac fd 6e bd 8e 70 3d 86 40 56 01 |..x....n..p=.@V.|
00000040 86 79 57 c0 47 00 |.yW.G.|
[8838 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8839 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038817f0 gate 1582330598464600200 evaluation starts
[883a 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038817f0 signed by 0 principal evaluation starts (used [false])
[883b 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038817f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[883c 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038817f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[883d 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038817f0 principal evaluation fails
[883e 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038817f0 gate 1582330598464600200 evaluation fails
[883f 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8840 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8841 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8842 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 0a ab 24 dd d4 88 cd 67 94 8a aa 85 c9 c2 28 |Z..$....g......(|
00000010 bd 0b f0 a3 fd bb 20 62 8c 8d 5b c7 a7 4f 59 0c |...... b..[..OY.|
[8843 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 62 39 00 ad d3 e0 76 41 8d 7c 68 |0D. Fb9....vA.|h|
00000010 35 f2 1b 6d c8 0f 6f 8c 91 f0 fb d2 7b 69 68 07 |5..m..o.....{ih.|
00000020 95 15 e0 1e 02 20 07 60 07 16 ed 8f b8 a1 8f 3a |..... .`.......:|
00000030 9b 16 78 fc ca ac fd 6e bd 8e 70 3d 86 40 56 01 |..x....n..p=.@V.|
00000040 86 79 57 c0 47 00 |.yW.G.|
[8844 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8845 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038940f0 gate 1582330598465121900 evaluation starts
[8846 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038940f0 signed by 0 principal evaluation starts (used [false])
[8847 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038940f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8848 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038940f0 principal evaluation succeeds for identity 0
[8849 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038940f0 gate 1582330598465121900 evaluation succeeds
[884a 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[884b 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[884c 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[884d 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[884e 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:95 , Envelope: 83 bytes, Signature: 70 bytes
[884f 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:95 , Envelope: 83 bytes, Signature: 70 bytes]}
[8850 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:95
[8851 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:95
[8852 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[8853 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8854 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8855 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8856 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[8857 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8858 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8859 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[885a 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[885b 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[885c 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[885d 02-22 00:16:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[885e 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15105C
[885f 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31775883C4AC88E41A0315066D0F08FC3DAAD14A830B33459C90223277957ACE
[8860 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[8861 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[8862 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8863 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[8864 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[8865 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8866 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[8867 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[8868 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8869 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[886a 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[886b 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[886c 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[886d 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[886e 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[886f 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[8870 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[8871 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[8872 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 77 58 83 c4 ac 88 e4 1a 03 15 06 6d 0f 08 fc |1wX.........m...|
00000010 3d aa d1 4a 83 0b 33 45 9c 90 22 32 77 95 7a ce |=..J..3E.."2w.z.|
[8873 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e c1 78 a0 1c 9f 11 c9 6f d5 e2 |0E.!...x.....o..|
00000010 ba a4 7c 06 4f 70 57 00 03 f9 d7 4b 45 6e f1 a5 |..|.OpW....KEn..|
00000020 d9 06 b4 c1 6d 02 20 3f f7 f7 c3 50 d2 fd 15 cb |....m. ?...P....|
00000030 bc c3 d6 26 5b e6 c6 b8 5b cd 70 53 15 d4 90 b3 |...&[...[.pS....|
00000040 67 7c 78 e7 f9 0f 2e |g|x....|
[8874 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes
[8875 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes
[8876 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8877 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[8878 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 c3 26 93 29 25 74 7c fe b0 6a c7 f0 e4 19 2a |..&.)%t|..j....*|
00000010 0d 6d e8 81 6d c1 63 4d fd 4d fc cb ef 72 cb c8 |.m..m.cM.M...r..|
[8879 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 86 94 f1 6a f0 1a bc c3 21 c1 f7 |0D. /...j....!..|
00000010 c3 84 49 85 1b e8 16 62 f1 97 d4 ac f9 a8 91 f3 |..I....b........|
00000020 14 cb bd 3d 02 20 63 97 4e d1 f0 79 b4 b7 59 45 |...=. c.N..y..YE|
00000030 31 ca 8a 87 4e ef c1 05 34 ed ab fd bd 84 62 24 |1...N...4.....b$|
00000040 d8 16 38 f0 9a 75 |..8..u|
[887a 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes
[887b 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[887c 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[887d 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[887e 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[887f 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8880 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8881 02-22 00:16:38.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8882 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8883 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8884 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 0a ab 24 dd d4 88 cd 67 94 8a aa 85 c9 c2 28 |Z..$....g......(|
00000010 bd 0b f0 a3 fd bb 20 62 8c 8d 5b c7 a7 4f 59 0c |...... b..[..OY.|
[8885 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 62 39 00 ad d3 e0 76 41 8d 7c 68 |0D. Fb9....vA.|h|
00000010 35 f2 1b 6d c8 0f 6f 8c 91 f0 fb d2 7b 69 68 07 |5..m..o.....{ih.|
00000020 95 15 e0 1e 02 20 07 60 07 16 ed 8f b8 a1 8f 3a |..... .`.......:|
00000030 9b 16 78 fc ca ac fd 6e bd 8e 70 3d 86 40 56 01 |..x....n..p=.@V.|
00000040 86 79 57 c0 47 00 |.yW.G.|
[8886 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8887 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4530 gate 1582330598551360000 evaluation starts
[8888 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4530 signed by 0 principal evaluation starts (used [false])
[8889 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4530 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[888a 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[888b 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4530 principal evaluation fails
[888c 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4530 gate 1582330598551360000 evaluation fails
[888d 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[888e 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[888f 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8890 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 0a ab 24 dd d4 88 cd 67 94 8a aa 85 c9 c2 28 |Z..$....g......(|
00000010 bd 0b f0 a3 fd bb 20 62 8c 8d 5b c7 a7 4f 59 0c |...... b..[..OY.|
[8891 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 62 39 00 ad d3 e0 76 41 8d 7c 68 |0D. Fb9....vA.|h|
00000010 35 f2 1b 6d c8 0f 6f 8c 91 f0 fb d2 7b 69 68 07 |5..m..o.....{ih.|
00000020 95 15 e0 1e 02 20 07 60 07 16 ed 8f b8 a1 8f 3a |..... .`.......:|
00000030 9b 16 78 fc ca ac fd 6e bd 8e 70 3d 86 40 56 01 |..x....n..p=.@V.|
00000040 86 79 57 c0 47 00 |.yW.G.|
[8892 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8893 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4e30 gate 1582330598552902700 evaluation starts
[8894 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4e30 signed by 0 principal evaluation starts (used [false])
[8895 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4e30 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8896 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4e30 principal evaluation succeeds for identity 0
[8897 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4e30 gate 1582330598552902700 evaluation succeeds
[8898 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8899 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[889a 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[889b 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[889c 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:95 , Envelope: 83 bytes, Signature: 70 bytes
[889d 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[889e 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[889f 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[88a0 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[88a1 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 77 58 83 c4 ac 88 e4 1a 03 15 06 6d 0f 08 fc |1wX.........m...|
00000010 3d aa d1 4a 83 0b 33 45 9c 90 22 32 77 95 7a ce |=..J..3E.."2w.z.|
[88a2 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e c1 78 a0 1c 9f 11 c9 6f d5 e2 |0E.!...x.....o..|
00000010 ba a4 7c 06 4f 70 57 00 03 f9 d7 4b 45 6e f1 a5 |..|.OpW....KEn..|
00000020 d9 06 b4 c1 6d 02 20 3f f7 f7 c3 50 d2 fd 15 cb |....m. ?...P....|
00000030 bc c3 d6 26 5b e6 c6 b8 5b cd 70 53 15 d4 90 b3 |...&[...[.pS....|
00000040 67 7c 78 e7 f9 0f 2e |g|x....|
[88a3 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[88a4 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 4a b2 73 c7 e5 8c ff 1d 0f 6d |0E.!..J.s......m|
00000010 9d 59 a6 40 64 33 54 4a 61 eb c9 bd 61 84 d3 31 |.Y.@d3TJa...a..1|
00000020 a0 5f 67 e0 62 02 20 4a 90 47 fe 1e 03 61 8e 2b |._g.b. J.G...a.+|
00000030 2d d7 fd 9b 7a a7 b3 2a de fa 25 15 e8 e1 c6 44 |-...z..*..%....D|
00000040 a2 85 fa 7b c7 4d ab |...{.M.|
[88a5 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[88a6 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[88a7 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88a8 02-22 00:16:38.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88a9 02-22 00:16:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88aa 02-22 00:16:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[88ab 02-22 00:16:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[88ac 02-22 00:16:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88ad 02-22 00:16:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[88ae 02-22 00:16:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[88af 02-22 00:16:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 77 58 83 c4 ac 88 e4 1a 03 15 06 6d 0f 08 fc |1wX.........m...|
00000010 3d aa d1 4a 83 0b 33 45 9c 90 22 32 77 95 7a ce |=..J..3E.."2w.z.|
[88b0 02-22 00:16:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e c1 78 a0 1c 9f 11 c9 6f d5 e2 |0E.!...x.....o..|
00000010 ba a4 7c 06 4f 70 57 00 03 f9 d7 4b 45 6e f1 a5 |..|.OpW....KEn..|
00000020 d9 06 b4 c1 6d 02 20 3f f7 f7 c3 50 d2 fd 15 cb |....m. ?...P....|
00000030 bc c3 d6 26 5b e6 c6 b8 5b cd 70 53 15 d4 90 b3 |...&[...[.pS....|
00000040 67 7c 78 e7 f9 0f 2e |g|x....|
[88b1 02-22 00:16:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes
[88b2 02-22 00:16:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:92 , Envelope: 83 bytes, Signature: 71 bytes
[88b3 02-22 00:16:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88b4 02-22 00:16:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[88b5 02-22 00:16:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 c3 26 93 29 25 74 7c fe b0 6a c7 f0 e4 19 2a |..&.)%t|..j....*|
00000010 0d 6d e8 81 6d c1 63 4d fd 4d fc cb ef 72 cb c8 |.m..m.cM.M...r..|
[88b6 02-22 00:16:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 86 94 f1 6a f0 1a bc c3 21 c1 f7 |0D. /...j....!..|
00000010 c3 84 49 85 1b e8 16 62 f1 97 d4 ac f9 a8 91 f3 |..I....b........|
00000020 14 cb bd 3d 02 20 63 97 4e d1 f0 79 b4 b7 59 45 |...=. c.N..y..YE|
00000030 31 ca 8a 87 4e ef c1 05 34 ed ab fd bd 84 62 24 |1...N...4.....b$|
00000040 d8 16 38 f0 9a 75 |..8..u|
[88b7 02-22 00:16:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes
[88b8 02-22 00:16:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88b9 02-22 00:16:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88ba 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[88bb 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88bc 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[88bd 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[88be 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88bf 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[88c0 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[88c1 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[88c2 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[88c3 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[88c4 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[88c5 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 c4 ea 71 5d 6b a0 e3 75 cd 65 64 6e fa 75 13 |u..q]k..u.edn.u.|
00000010 e1 7c f2 d2 44 09 e9 81 ed 18 c4 39 8a 71 25 60 |.|..D......9.q%`|
[88c6 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f c4 d9 b4 9a bf bc 88 86 c5 45 c4 |0D. ..........E.|
00000010 22 63 59 80 36 19 3b db 32 fe 7c 23 f5 34 cc 24 |"cY.6.;.2.|#.4.$|
00000020 98 45 3c b5 02 20 3f 29 7b 79 8d 69 6f e6 59 e3 |.E<.. ?){y.io.Y.|
00000030 8e b0 c6 71 02 d9 d1 d3 06 4d c5 f3 60 41 48 9b |...q.....M..`AH.|
00000040 ce a0 2d 0f 12 14 |..-...|
[88c7 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[88c8 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948540 gate 1582330598629859700 evaluation starts
[88c9 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948540 signed by 0 principal evaluation starts (used [false])
[88ca 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948540 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[88cb 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[88cc 02-22 00:16:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948540 principal evaluation fails
[88cd 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948540 gate 1582330598629859700 evaluation fails
[88ce 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[88cf 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[88d0 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[88d1 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 c4 ea 71 5d 6b a0 e3 75 cd 65 64 6e fa 75 13 |u..q]k..u.edn.u.|
00000010 e1 7c f2 d2 44 09 e9 81 ed 18 c4 39 8a 71 25 60 |.|..D......9.q%`|
[88d2 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f c4 d9 b4 9a bf bc 88 86 c5 45 c4 |0D. ..........E.|
00000010 22 63 59 80 36 19 3b db 32 fe 7c 23 f5 34 cc 24 |"cY.6.;.2.|#.4.$|
00000020 98 45 3c b5 02 20 3f 29 7b 79 8d 69 6f e6 59 e3 |.E<.. ?){y.io.Y.|
00000030 8e b0 c6 71 02 d9 d1 d3 06 4d c5 f3 60 41 48 9b |...q.....M..`AH.|
00000040 ce a0 2d 0f 12 14 |..-...|
[88d3 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[88d4 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948e40 gate 1582330598630332900 evaluation starts
[88d5 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948e40 signed by 0 principal evaluation starts (used [false])
[88d6 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948e40 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[88d7 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948e40 principal evaluation succeeds for identity 0
[88d8 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948e40 gate 1582330598630332900 evaluation succeeds
[88d9 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[88da 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[88db 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[88dc 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[88dd 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes
[88de 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes]}
[88df 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:93
[88e0 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:93
[88e1 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:92 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[88e2 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88e3 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88e4 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88e5 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[88e6 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88e7 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88e8 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88e9 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[88ea 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[88eb 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[88ec 02-22 00:16:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88ed 02-22 00:16:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88ee 02-22 00:16:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88ef 02-22 00:16:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[88f0 02-22 00:16:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[88f1 02-22 00:16:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88f2 02-22 00:16:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[88f3 02-22 00:16:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[88f4 02-22 00:16:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[88f5 02-22 00:16:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[88f6 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[88f7 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 bb f9 b3 ae 00 00 35 24 2f dd 01 a1 9c da |........5$/.....|
00000010 b8 7f 78 86 f1 13 01 38 9e 43 2c 9a 0b 7f 81 7c |..x....8.C,....||
[88f8 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae ef 65 ca 50 56 7d 82 bf 1b 33 |0E.!...e.PV}...3|
00000010 82 6c c3 71 1b f1 c2 20 4b a1 36 7c 0d 4c ff 33 |.l.q... K.6|.L.3|
00000020 dd 20 f8 dc 1b 02 20 5d 61 08 72 e0 77 a4 af 78 |. .... ]a.r.w..x|
00000030 36 f3 f9 99 83 58 00 26 0e b3 e0 ce f7 5d e8 9b |6....X.&.....]..|
00000040 b3 e8 92 8b 7f 34 50 |.....4P|
[88f9 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88fa 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[88fb 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[88fc 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[88fd 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[88fe 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[88ff 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8900 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8901 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[8902 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[8903 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8904 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003992a80 gate 1582330598943758200 evaluation starts
[8905 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003992a80 signed by 0 principal evaluation starts (used [false])
[8906 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003992a80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8907 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003992a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8908 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003992a80 principal evaluation fails
[8909 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003992a80 gate 1582330598943758200 evaluation fails
[890a 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[890b 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[890c 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[890d 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[890e 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[890f 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8910 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003993380 gate 1582330598944717700 evaluation starts
[8911 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003993380 signed by 0 principal evaluation starts (used [false])
[8912 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003993380 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8913 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003993380 principal evaluation succeeds for identity 0
[8914 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003993380 gate 1582330598944717700 evaluation succeeds
[8915 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8916 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8917 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8918 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8919 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[891a 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[891b 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[891c 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[891d 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[891e 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[891f 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8920 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8921 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[8922 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[8923 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8924 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8df0 gate 1582330598945546000 evaluation starts
[8925 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8df0 signed by 0 principal evaluation starts (used [false])
[8926 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8df0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8927 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8928 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8df0 principal evaluation fails
[8929 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8df0 gate 1582330598945546000 evaluation fails
[892a 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[892b 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[892c 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[892d 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[892e 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[892f 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8930 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b96f0 gate 1582330598945974400 evaluation starts
[8931 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b96f0 signed by 0 principal evaluation starts (used [false])
[8932 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b96f0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8933 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b96f0 principal evaluation succeeds for identity 0
[8934 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b96f0 gate 1582330598945974400 evaluation succeeds
[8935 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8936 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8937 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8938 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8939 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[893a 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[893b 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[893c 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[893d 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[893e 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[893f 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[8940 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8942 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8943 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8944 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8945 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8946 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8947 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[8948 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[8949 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[894a 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e9540 gate 1582330598949751300 evaluation starts
[894b 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e9540 signed by 0 principal evaluation starts (used [false])
[894c 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e9540 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[894d 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e9540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[894e 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e9540 principal evaluation fails
[894f 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e9540 gate 1582330598949751300 evaluation fails
[8950 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8951 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8952 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8953 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[8954 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[8955 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8956 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e9e40 gate 1582330598950177400 evaluation starts
[8957 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e9e40 signed by 0 principal evaluation starts (used [false])
[8958 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e9e40 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8959 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e9e40 principal evaluation succeeds for identity 0
[895a 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e9e40 gate 1582330598950177400 evaluation succeeds
[895b 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[895c 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[895d 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[895e 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[895f 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 bb f9 b3 ae 00 00 35 24 2f dd 01 a1 9c da |........5$/.....|
00000010 b8 7f 78 86 f1 13 01 38 9e 43 2c 9a 0b 7f 81 7c |..x....8.C,....||
[8960 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae ef 65 ca 50 56 7d 82 bf 1b 33 |0E.!...e.PV}...3|
00000010 82 6c c3 71 1b f1 c2 20 4b a1 36 7c 0d 4c ff 33 |.l.q... K.6|.L.3|
00000020 dd 20 f8 dc 1b 02 20 5d 61 08 72 e0 77 a4 af 78 |. .... ]a.r.w..x|
00000030 36 f3 f9 99 83 58 00 26 0e b3 e0 ce f7 5d e8 9b |6....X.&.....]..|
00000040 b3 e8 92 8b 7f 34 50 |.....4P|
[8961 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[8962 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[8963 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8964 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8965 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8966 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8967 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8968 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8969 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[896a 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[896b 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[896c 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[896d 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[896e 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a32630 gate 1582330598952139400 evaluation starts
[896f 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a32630 signed by 0 principal evaluation starts (used [false])
[8970 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a32630 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8971 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a32630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8972 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a32630 principal evaluation fails
[8973 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a32630 gate 1582330598952139400 evaluation fails
[8974 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8975 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8976 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8977 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[8978 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[8979 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[897a 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a32f30 gate 1582330598952676200 evaluation starts
[897b 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a32f30 signed by 0 principal evaluation starts (used [false])
[897c 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a32f30 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[897d 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a32f30 principal evaluation succeeds for identity 0
[897e 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a32f30 gate 1582330598952676200 evaluation succeeds
[897f 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8980 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8981 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8982 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8983 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8941 02-22 00:16:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8984 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[8985 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8986 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8987 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8988 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8989 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[898a 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[898b 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[898c 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[898d 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[898e 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[898f 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[8990 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8991 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a62740 gate 1582330598957010900 evaluation starts
[8992 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a62740 signed by 0 principal evaluation starts (used [false])
[8993 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a62740 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8994 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a62740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8995 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a62740 principal evaluation fails
[8996 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a62740 gate 1582330598957010900 evaluation fails
[8997 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8998 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8999 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[899a 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[899b 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[899c 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[899d 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a63040 gate 1582330598957589200 evaluation starts
[899e 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a63040 signed by 0 principal evaluation starts (used [false])
[899f 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a63040 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[89a0 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a63040 principal evaluation succeeds for identity 0
[89a1 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a63040 gate 1582330598957589200 evaluation succeeds
[89a2 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[89a3 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[89a4 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[89a5 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[89a6 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 bb f9 b3 ae 00 00 35 24 2f dd 01 a1 9c da |........5$/.....|
00000010 b8 7f 78 86 f1 13 01 38 9e 43 2c 9a 0b 7f 81 7c |..x....8.C,....||
[89a7 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae ef 65 ca 50 56 7d 82 bf 1b 33 |0E.!...e.PV}...3|
00000010 82 6c c3 71 1b f1 c2 20 4b a1 36 7c 0d 4c ff 33 |.l.q... K.6|.L.3|
00000020 dd 20 f8 dc 1b 02 20 5d 61 08 72 e0 77 a4 af 78 |. .... ]a.r.w..x|
00000030 36 f3 f9 99 83 58 00 26 0e b3 e0 ce f7 5d e8 9b |6....X.&.....]..|
00000040 b3 e8 92 8b 7f 34 50 |.....4P|
[89a8 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[89a9 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[89aa 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89ab 02-22 00:16:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89ac 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[89ad 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[89ae 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[89af 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[89b0 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[89b1 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[89b2 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[89b3 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[89b4 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[89b5 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75830 gate 1582330598960434400 evaluation starts
[89b6 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75830 signed by 0 principal evaluation starts (used [false])
[89b7 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75830 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[89b8 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[89b9 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75830 principal evaluation fails
[89ba 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75830 gate 1582330598960434400 evaluation fails
[89bb 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[89bc 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[89bd 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[89be 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[89bf 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[89c0 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[89c1 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ade130 gate 1582330598961943500 evaluation starts
[89c2 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ade130 signed by 0 principal evaluation starts (used [false])
[89c3 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ade130 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[89c4 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ade130 principal evaluation succeeds for identity 0
[89c5 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ade130 gate 1582330598961943500 evaluation succeeds
[89c6 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[89c7 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[89c8 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[89c9 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[89ca 02-22 00:16:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89cb 02-22 00:16:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89cc 02-22 00:16:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89cd 02-22 00:16:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[89ce 02-22 00:16:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89cf 02-22 00:16:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89d0 02-22 00:16:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8367679825821685672 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[89d1 02-22 00:16:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:8367679825821685672 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[89d2 02-22 00:16:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89d3 02-22 00:16:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8367679825821685672 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 8 1 2 3], Envelope: 57 bytes, Signature: 0 bytes
[89d4 02-22 00:16:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8367679825821685672 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 8 1 2 3], Envelope: 57 bytes, Signature: 0 bytes
[89d5 02-22 00:16:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89d6 02-22 00:16:39.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:97 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[89d7 02-22 00:16:39.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89d8 02-22 00:16:39.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:97 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[89d9 02-22 00:16:39.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[89da 02-22 00:16:39.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 c9 b4 68 f3 46 e7 da a5 ed 1a fa 47 83 32 26 |...h.F......G.2&|
00000010 52 46 bf 63 36 8a 20 06 bc 6d 44 7f 81 88 4f 6e |RF.c6. ..mD...On|
[89db 02-22 00:16:39.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c 47 55 7e 09 44 74 d8 2f 34 e3 |0E.!..GU~.Dt./4.|
00000010 0e a6 50 70 5e 32 7d 3a c6 85 8e 93 30 d5 3e 84 |..Pp^2}:....0.>.|
00000020 a5 e6 62 79 01 02 20 55 e0 67 09 17 60 2f 4b 0b |..by.. U.g..`/K.|
00000030 76 52 e9 bb 92 cf f4 14 42 1b db fd 10 35 2a b5 |vR......B....5*.|
00000040 f5 cd 01 25 8a 48 30 |...%.H0|
[89dc 02-22 00:16:39.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[89dd 02-22 00:16:39.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee d7 66 4a 20 2e da 11 f5 43 16 |0E.!...fJ ....C.|
00000010 9f c9 8e 5e 47 d1 fe d5 40 d7 94 e7 44 04 4a 74 |...^G...@...D.Jt|
00000020 32 7d cb ca 07 02 20 7a 39 1f 11 31 a9 f5 cf 84 |2}.... z9..1....|
00000030 4c dc 9e c4 44 b0 cc 58 af ee f0 18 db e3 f5 09 |L...D..X........|
00000040 23 37 7b eb c4 95 8b |#7{....|
[89de 02-22 00:16:39.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:97 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[89df 02-22 00:16:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:97 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[89e0 02-22 00:16:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:97
[89e1 02-22 00:16:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:97
[89e2 02-22 00:16:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[89e3 02-22 00:16:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89e4 02-22 00:16:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89e5 02-22 00:16:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89e6 02-22 00:16:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89e7 02-22 00:16:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89e8 02-22 00:16:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89e9 02-22 00:16:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:97 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[89ea 02-22 00:16:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89eb 02-22 00:16:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:97 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[89ec 02-22 00:16:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:97 , Envelope: 83 bytes, Signature: 71 bytes
[89ee 02-22 00:16:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89ed 02-22 00:16:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:97 , Envelope: 83 bytes, Signature: 71 bytes
[89ef 02-22 00:16:39.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89f0 02-22 00:16:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:97 , Envelope: 83 bytes, Signature: 71 bytes
[89f1 02-22 00:16:39.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89f2 02-22 00:16:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:97 , Envelope: 83 bytes, Signature: 71 bytes
[89f3 02-22 00:16:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89f4 02-22 00:16:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:97 , Envelope: 83 bytes, Signature: 71 bytes
[89f5 02-22 00:16:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:97 , Envelope: 83 bytes, Signature: 71 bytes
[89f6 02-22 00:16:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89f7 02-22 00:16:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:97 , Envelope: 83 bytes, Signature: 71 bytes
[89f8 02-22 00:16:39.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89f9 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes
[89fa 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes
[89fb 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[89fc 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes
[89fd 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[89fe 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[89ff 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8a00 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8a01 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8a02 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8a03 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8a04 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8a05 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 53 a8 ad f0 73 83 6d 74 06 51 8a 57 c1 3f e3 |.S...s.mt.Q.W.?.|
00000010 8c d5 7a 77 79 7a 74 3e b4 f6 59 ee 0c 09 38 4b |..zwyzt>..Y...8K|
[8a06 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 b5 a9 4c 6e d7 55 c0 cd b6 9a 19 |0D. f..Ln.U.....|
00000010 2a d8 a4 89 9d 02 ef d3 a4 73 46 14 78 55 58 56 |*........sF.xUXV|
00000020 a6 03 d3 dc 02 20 21 2a 9c 9c 56 73 7a db 59 39 |..... !*..Vsz.Y9|
00000030 de 98 22 29 37 01 7e bf 8c 35 97 39 52 43 ea 58 |..")7.~..5.9RC.X|
00000040 9e 33 72 ad 99 bd |.3r...|
[8a07 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8a08 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6f020 gate 1582330599234532900 evaluation starts
[8a09 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6f020 signed by 0 principal evaluation starts (used [false])
[8a0a 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6f020 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8a0b 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6f020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8a0c 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6f020 principal evaluation fails
[8a0d 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6f020 gate 1582330599234532900 evaluation fails
[8a0e 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8a0f 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8a10 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8a11 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 53 a8 ad f0 73 83 6d 74 06 51 8a 57 c1 3f e3 |.S...s.mt.Q.W.?.|
00000010 8c d5 7a 77 79 7a 74 3e b4 f6 59 ee 0c 09 38 4b |..zwyzt>..Y...8K|
[8a12 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 b5 a9 4c 6e d7 55 c0 cd b6 9a 19 |0D. f..Ln.U.....|
00000010 2a d8 a4 89 9d 02 ef d3 a4 73 46 14 78 55 58 56 |*........sF.xUXV|
00000020 a6 03 d3 dc 02 20 21 2a 9c 9c 56 73 7a db 59 39 |..... !*..Vsz.Y9|
00000030 de 98 22 29 37 01 7e bf 8c 35 97 39 52 43 ea 58 |..")7.~..5.9RC.X|
00000040 9e 33 72 ad 99 bd |.3r...|
[8a13 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8a14 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6f920 gate 1582330599234951900 evaluation starts
[8a15 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6f920 signed by 0 principal evaluation starts (used [false])
[8a16 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6f920 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8a17 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6f920 principal evaluation succeeds for identity 0
[8a18 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6f920 gate 1582330599234951900 evaluation succeeds
[8a19 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8a1a 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8a1b 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8a1c 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8a1d 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes
[8a1e 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes]}
[8a1f 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:96
[8a20 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:96
[8a21 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:95 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[8a22 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a23 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a24 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a25 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a26 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a27 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a28 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a29 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a2a 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a2b 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[8a2c 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a2d 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a2e 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[8a2f 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes
[8a31 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a32 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes
[8a33 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes
[8a34 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a35 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a30 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes
[8a36 02-22 00:16:39.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a37 02-22 00:16:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes
[8a38 02-22 00:16:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a39 02-22 00:16:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes
[8a3a 02-22 00:16:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a3b 02-22 00:16:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[8a3c 02-22 00:16:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[8a3d 02-22 00:16:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510241801
[8a3e 02-22 00:16:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E29FA6E53395C43EE05E3465324D30E615987D7CD04EE13AAD4EFC832F38AD65
[8a3f 02-22 00:16:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[8a40 02-22 00:16:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a41 02-22 00:16:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a42 02-22 00:16:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a43 02-22 00:16:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a44 02-22 00:16:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:36 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[8a45 02-22 00:16:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a46 02-22 00:16:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a47 02-22 00:16:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:36 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[8a48 02-22 00:16:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a49 02-22 00:16:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[8a4a 02-22 00:16:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a4b 02-22 00:16:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a4c 02-22 00:16:39.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a4d 02-22 00:16:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA15105D
[8a4e 02-22 00:16:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C2972CEFE6D0E5B34B51D6BAC3A298050596D5E1EB60981D3C73C9078C4F7394
[8a4f 02-22 00:16:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[8a50 02-22 00:16:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[8a51 02-22 00:16:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[8a52 02-22 00:16:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a53 02-22 00:16:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a54 02-22 00:16:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers
[8a55 02-22 00:16:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a56 02-22 00:16:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[8a57 02-22 00:16:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a58 02-22 00:16:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[8a59 02-22 00:16:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes
[8a5a 02-22 00:16:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a5b 02-22 00:16:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[8a5c 02-22 00:16:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a5d 02-22 00:16:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:93 , Envelope: 83 bytes, Signature: 71 bytes
[8a5e 02-22 00:16:39.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a5f 02-22 00:16:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7405241518805842730 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[8a60 02-22 00:16:39.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7405241518805842730 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[8a61 02-22 00:16:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 5 6 7 8 1 2] to 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[8a62 02-22 00:16:39.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a63 02-22 00:16:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[8a64 02-22 00:16:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a65 02-22 00:16:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a66 02-22 00:16:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a67 02-22 00:16:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a68 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34096 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8a69 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a6a 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8a6b 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[8a6c 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a6d 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8a6e 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8a6f 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8a70 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8a71 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8a72 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8a73 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 7c 5f 66 93 01 bd 36 9e 11 34 a8 1e cb f0 9a |.|_f...6..4.....|
00000010 6a 95 ea 00 31 36 08 0e 2f fe 4f 65 ad f0 c9 22 |j...16../.Oe..."|
[8a74 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 83 e3 9e 09 35 44 7b 0a c2 0f ec |0D. ,....5D{....|
00000010 28 00 76 7a 8a 6b d5 dd 2c f4 3c 51 5c 2d 2f df |(.vz.k..,.<Q\-/.|
00000020 13 e5 2c 7b 02 20 56 93 3f 48 b0 d9 e5 0e df ba |..,{. V.?H......|
00000030 66 7a 2b e0 7b 54 c8 4c ef 05 38 be f6 17 15 6b |fz+.{T.L..8....k|
00000040 6f 37 74 4f 92 df |o7tO..|
[8a75 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8a76 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bef960 gate 1582330600132559700 evaluation starts
[8a77 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bef960 signed by 0 principal evaluation starts (used [false])
[8a78 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bef960 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8a79 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bef960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8a7a 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bef960 principal evaluation fails
[8a7b 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bef960 gate 1582330600132559700 evaluation fails
[8a7c 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8a7d 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8a7e 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8a7f 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 7c 5f 66 93 01 bd 36 9e 11 34 a8 1e cb f0 9a |.|_f...6..4.....|
00000010 6a 95 ea 00 31 36 08 0e 2f fe 4f 65 ad f0 c9 22 |j...16../.Oe..."|
[8a80 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 83 e3 9e 09 35 44 7b 0a c2 0f ec |0D. ,....5D{....|
00000010 28 00 76 7a 8a 6b d5 dd 2c f4 3c 51 5c 2d 2f df |(.vz.k..,.<Q\-/.|
00000020 13 e5 2c 7b 02 20 56 93 3f 48 b0 d9 e5 0e df ba |..,{. V.?H......|
00000030 66 7a 2b e0 7b 54 c8 4c ef 05 38 be f6 17 15 6b |fz+.{T.L..8....k|
00000040 6f 37 74 4f 92 df |o7tO..|
[8a81 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8a82 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c260 gate 1582330600134574300 evaluation starts
[8a83 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c260 signed by 0 principal evaluation starts (used [false])
[8a84 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c260 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8a86 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[8a87 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[8a88 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a89 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a8a 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a85 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c260 principal evaluation succeeds for identity 0
[8a8b 02-22 00:16:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c260 gate 1582330600134574300 evaluation succeeds
[8a8c 02-22 00:16:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a8d 02-22 00:16:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8a8e 02-22 00:16:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8a8f 02-22 00:16:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8a90 02-22 00:16:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8a91 02-22 00:16:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8a92 02-22 00:16:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes]}
[8a93 02-22 00:16:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:94
[8a94 02-22 00:16:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:94
[8a95 02-22 00:16:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:93 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[8a96 02-22 00:16:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a97 02-22 00:16:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a98 02-22 00:16:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8a99 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a9a 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a9b 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a9c 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a9d 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a9e 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8a9f 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8aa0 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[8aa1 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8aa2 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[8aa3 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8aa4 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8aa5 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8aa6 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8aa7 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8aa8 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8aa9 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8aaa 02-22 00:16:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8aab 02-22 00:16:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8aac 02-22 00:16:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8aad 02-22 00:16:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8aae 02-22 00:16:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes
[8aaf 02-22 00:16:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ab0 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8ab1 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true]
[8ab2 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==
[8ab3 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8ab4 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==
[8ab5 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa 76 50 84 bb 85 da bb 60 98 ef 75 c5 11 a1 0f |.vP.....`..u....|
00000010 a0 92 05 69 fd 64 a0 b5 d3 a5 d3 de 9a 53 43 9b |...i.d.......SC.|
[8ab6 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 6c a0 c2 ad 19 ce be 40 fc 3b |0E.!..l......@.;|
00000010 76 a4 af db 93 cc 78 e3 92 eb 9a 34 86 50 9c a9 |v.....x....4.P..|
00000020 8e 86 84 f2 59 02 20 73 cb 72 aa cf bd 71 63 cb |....Y. s.r...qc.|
00000030 17 e3 44 31 33 d1 e7 ac 58 44 03 cf 6d 8a d5 b8 |..D13...XD..m...|
00000040 6b 14 20 23 53 2c 79 |k. #S,y|
[8ab7 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8ab8 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3aab0 gate 1582330600588162100 evaluation starts
[8ab9 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3aab0 signed by 0 principal evaluation starts (used [false])
[8aba 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3aab0 processing identity 0 - &{OrdererMSP 9de2412befbda85787d990eb15cf69142545cfd8abf27ca5a151a46e885ec6cd}
[8abb 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3aab0 principal evaluation succeeds for identity 0
[8abc 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3aab0 gate 1582330600588162100 evaluation succeeds
[8abd 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers
[8abe 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers
[8abf 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation
[8ac0 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Orderer/BlockValidation
[8ac1 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding payload to local buffer, blockNum = [9] channel=businesschannel
[8ac2 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [9]
[8ac3 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks
[8ac5 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Gossiping block [9] channel=businesschannel
[8ac4 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [9]
[8ac6 02-22 00:16:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [9] with 1 transaction(s) to the ledger
[8ac7 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [9] from buffer
[8ac8 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [9]
[8ac9 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [9]
[8aca 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses
[8acb 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0034fb080 env 0xc004c24050 txn 0
[8acc 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004c24050
[8acd 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\350\345\301\362\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\njaA=\n-----END CERTIFICATE-----\n\022\030\252\364k\204I\370\241\371\212\323\346\247,\343\212\254mZ~\315\271oN\340"
[8ace 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1
[8acf 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU begin
[8ad0 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel'
[8ad1 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP 9de2412befbda85787d990eb15cf69142545cfd8abf27ca5a151a46e885ec6cd}
[8ad2 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[8ad3 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid
[8ad4 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 99 fc 8a 32 74 8d e0 e7 3f 7b e5 f2 3f 0f fa |u...2t...?{..?..|
00000010 9c 7b 70 01 62 c2 47 31 b7 51 c3 e4 5f 83 44 b9 |.{p.b.G1.Q.._.D.|
[8ad5 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d e6 b0 26 46 90 7d 4b 4b 38 73 97 |0D. }..&F.}KK8s.|
00000010 80 71 4e 88 17 51 c4 b3 67 c1 7d c0 19 6b 57 3f |.qN..Q..g.}..kW?|
00000020 f0 ba bf 44 02 20 07 bd 37 a8 ba cf c8 5f 18 11 |...D. ..7...._..|
00000030 93 71 15 8b 3e 59 81 70 7a aa 56 c2 70 ae 67 19 |.q..>Y.pz.V.p.g.|
00000040 da 1c d6 ed 18 e9 |......|
[8ad6 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully
[8ad7 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc003d54000, header channel_header:"\010\001\032\006\010\350\345\301\362\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\njaA=\n-----END CERTIFICATE-----\n\022\030\252\364k\204I\370\241\371\212\323\346\247,\343\212\254mZ~\315\271oN\340"
[8ad8 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel
[8ad9 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[8ada 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[8adb 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP
[8adc 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP
[8add 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities
[8ade 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs
[8adf 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement
[8ae0 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement
[8ae1 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers
[8ae2 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers
[8ae3 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins
[8ae4 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[8ae5 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[8ae6 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP
[8ae7 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP
[8ae8 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP
[8ae9 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP
[8aea 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers
[8aeb 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers
[8aec 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins
[8aed 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement
[8aee 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs
[8aef 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities
[8af0 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers
[8af1 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers
[8af2 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins
[8af3 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement
[8af4 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement
[8af5 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application
[8af6 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins
[8af7 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path []
[8af8 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[8af9 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[8afa 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application]
[8afb 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[8afc 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[8afd 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path []
[8afe 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[8aff 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[8b00 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Admins ==
[8b01 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8b02 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==
[8b03 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b a0 c1 28 83 74 11 37 4a a8 f6 fb 44 85 5b 16 |[..(.t.7J...D.[.|
00000010 f4 69 ec 78 91 f8 a4 a5 4b de 20 11 79 b4 04 34 |.i.x....K. .y..4|
[8b04 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 9b 3b 61 d3 b3 3f 77 e4 a9 8d 06 |0D. 5.;a..?w....|
00000010 f7 15 59 ae 81 5e 31 1e e6 f4 fc cd e0 ef d6 24 |..Y..^1........$|
00000020 9c ba 1d 24 02 20 51 d9 3f 84 71 99 6b 86 5e 77 |...$. Q.?.q.k.^w|
00000030 5c 7d e7 48 da f3 8c 3c 47 39 2a c9 ee 4d b4 9c |\}.H...<G9*..M..|
00000040 56 1b a2 06 5f 5c |V..._\|
[8b05 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8b06 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f bc a2 06 1a 59 f0 83 b7 81 ae 34 19 a1 4c ad |o....Y.....4..L.|
00000010 7d 1f d7 6a 10 da ea df 5d f1 3e 7d 18 9c 0c d3 |}..j....].>}....|
[8b07 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 e3 25 22 dc 59 6c 4b 57 55 a4 24 |0D. e.%".YlKWU.$|
00000010 e9 83 08 cf e4 b2 82 09 b0 b6 34 81 4c 9c 83 d4 |..........4.L...|
00000020 95 fa 9e ee 02 20 12 73 f0 d2 73 8e f8 43 5c 08 |..... .s..s..C\.|
00000030 5d 4f ee ca 2e 02 6a f5 3d c6 f7 9a 55 0e 47 e7 |]O....j.=...U.G.|
00000040 e7 b3 1d 9d 85 7b |.....{|
[8b08 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 1 validated
[8b09 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa] at index 2 in signature set
[8b0a 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0f350 gate 1582330600597972400 evaluation starts
[8b0b 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0f350 signed by 0 principal evaluation starts (used [false false])
[8b0c 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0f350 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[8b0d 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP
[8b0e 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP
[8b0f 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[8b10 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client
[8b11 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[8b12 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0f350 principal evaluation succeeds for identity 0
[8b13 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0f350 gate 1582330600597972400 evaluation succeeds
[8b14 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins
[8b15 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins
[8b16 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==
[8b17 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b a0 c1 28 83 74 11 37 4a a8 f6 fb 44 85 5b 16 |[..(.t.7J...D.[.|
00000010 f4 69 ec 78 91 f8 a4 a5 4b de 20 11 79 b4 04 34 |.i.x....K. .y..4|
[8b18 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 9b 3b 61 d3 b3 3f 77 e4 a9 8d 06 |0D. 5.;a..?w....|
00000010 f7 15 59 ae 81 5e 31 1e e6 f4 fc cd e0 ef d6 24 |..Y..^1........$|
00000020 9c ba 1d 24 02 20 51 d9 3f 84 71 99 6b 86 5e 77 |...$. Q.?.q.k.^w|
00000030 5c 7d e7 48 da f3 8c 3c 47 39 2a c9 ee 4d b4 9c |\}.H...<G9*..M..|
00000040 56 1b a2 06 5f 5c |V..._\|
[8b19 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8b1a 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f bc a2 06 1a 59 f0 83 b7 81 ae 34 19 a1 4c ad |o....Y.....4..L.|
00000010 7d 1f d7 6a 10 da ea df 5d f1 3e 7d 18 9c 0c d3 |}..j....].>}....|
[8b1b 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 e3 25 22 dc 59 6c 4b 57 55 a4 24 |0D. e.%".YlKWU.$|
00000010 e9 83 08 cf e4 b2 82 09 b0 b6 34 81 4c 9c 83 d4 |..........4.L...|
00000020 95 fa 9e ee 02 20 12 73 f0 d2 73 8e f8 43 5c 08 |..... .s..s..C\.|
00000030 5d 4f ee ca 2e 02 6a f5 3d c6 f7 9a 55 0e 47 e7 |]O....j.=...U.G.|
00000040 e7 b3 1d 9d 85 7b |.....{|
[8b1c 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 1 validated
[8b1d 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa] at index 2 in signature set
[8b1e 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0fb90 gate 1582330600599076500 evaluation starts
[8b1f 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0fb90 signed by 0 principal evaluation starts (used [false false])
[8b20 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0fb90 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[8b21 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0fb90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)
[8b22 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0fb90 processing identity 1 - &{Org2MSP 44c87d6d29f5a901134fda071a7edf7126a7788becd3944cea03a9d24174d773}
[8b23 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP
[8b24 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP
[8b25 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[8b26 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client
[8b27 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[8b28 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0fb90 principal evaluation succeeds for identity 1
[8b29 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0fb90 gate 1582330600599076500 evaluation succeeds
[8b2a 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins
[8b2b 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins
[8b2c 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins
[8b2d 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Admins
[8b2e 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers
[8b2f 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers
[8b30 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins
[8b31 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement
[8b32 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP
[8b33 02-22 00:16:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP
[8b34 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 39019 bytes, seq: 9}, Envelope: 39052 bytes, Signature: 0 bytes to the block puller
[8b35 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Added 9, total items: 9
[8b36 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org3MSP\020\001" > mod_policy:"Admins"
[8b37 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins"
[8b38 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins"
[8b39 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org3MSP" > mod_policy:"Admins"
[8b3a 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org1MSP\020\001" > mod_policy:"Admins"
[8b3b 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins"
[8b3c 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins"
[8b3d 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org1MSP" > mod_policy:"Admins"
[8b3e 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\r\022\013\n\007Org2MSP\020\001" > mod_policy:"Admins"
[8b3f 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins"
[8b40 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins"
[8b41 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\013\022\t\n\007Org2MSP" > mod_policy:"Admins"
[8b42 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to
[8b43 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to
[8b44 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to
[8b45 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to
[8b46 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to
[8b47 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\020\022\016\n\nOrdererMSP\020\001" > mod_policy:"Admins"
[8b48 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins"
[8b49 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:1 value:"\022\010\022\006\010\001\022\002\010\000\032\016\022\014\n\nOrdererMSP" > mod_policy:"Admins"
[8b4a 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins"
[8b4b 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[8b4c 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins"
[8b4d 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[8b4e 02-22 00:16:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy:<type:3 value:"\n\007Writers" > mod_policy:"Admins"
[8b4f 02-22 00:16:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8b50 02-22 00:16:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8b51 02-22 00:16:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8b52 02-22 00:16:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8b53 02-22 00:16:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 39019 bytes, seq: 9}, Envelope: 39052 bytes, Signature: 0 bytes to 1 peers
[8b54 02-22 00:16:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8b55 02-22 00:16:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8b56 02-22 00:16:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 39019 bytes, seq: 9}, Envelope: 39052 bytes, Signature: 0 bytes
[8b57 02-22 00:16:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8b58 02-22 00:16:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy:<type:3 value:"\n\006Admins\020\002" > mod_policy:"Admins"
[8b59 02-22 00:16:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy:<type:3 value:"\n\007Readers" > mod_policy:"Admins"
[8b5a 02-22 00:16:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos
[8b5b 02-22 00:16:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm
[8b5c 02-22 00:16:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure
[8b5d 02-22 00:16:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses
[8b5e 02-22 00:16:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium
[8b5f 02-22 00:16:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[8b60 02-22 00:16:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos
[8b61 02-22 00:16:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs
[8b62 02-22 00:16:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[8b63 02-22 00:16:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[8b64 02-22 00:16:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[8b65 02-22 00:16:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[8b66 02-22 00:16:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[8b67 02-22 00:16:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers:<host:"peer0.org2.example.com" port:7051 >
[8b68 02-22 00:16:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP
[8b69 02-22 00:16:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[8b6a 02-22 00:16:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[8b6b 02-22 00:16:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP
[8b6c 02-22 00:16:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICUTCCAfegAwIBAgIQZacO26pEEi7uRpxMqrT/NDAKBggqhkjOPQQDAjBzMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
b3JnMi5leGFtcGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBa
MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD
ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE
V3ISfdpJiQsD3lyTyf2qPntUF1rq7Y+XsMAe1KNz771i2jYrz/EsxNF4w8zXuE/b
6+xjJgUj/SEZ0dTpzRC8R6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG
CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBV
4NvNjFI29qDlGrBaOerjLlzOGL4FjLU9jq1sTeOXlTAKBggqhkjOPQQDAgNIADBF
AiBaOCByB93x9gnKUekOc59nK5sJBrm0F5Ju4FmZaEs28QIhAMlVxThPZpkKkSRW
FGc7n+YB0YmkroQBRyltH6EFZkw9
-----END CERTIFICATE-----
[8b6d 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[8b6e 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[8b6f 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[8b70 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[8b71 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are
[8b72 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP
[8b73 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[8b74 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[8b75 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP
[8b76 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[8b77 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos
[8b78 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers
[8b79 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[8b7a 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[8b7b 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers:<host:"peer0.org1.example.com" port:7051 >
[8b7c 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP
[8b7d 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[8b7e 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[8b7f 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP
[8b80 02-22 00:16:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICUTCCAfegAwIBAgIQfMtqJpvCGTzjpT2VwLq7BzAKBggqhkjOPQQDAjBzMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu
b3JnMS5leGFtcGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBa
MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T
YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD
ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE
JKKf3L2HjJrpCA0CTjwzNVE/bLBTStO/vkPBdBkKcVyv2jZeJ8wLp2RzbxoeWujy
E36hYwbFJMyr9rLEVlmHUaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG
CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCDT
LhW9xkIt1KmVqE4YpPTmFwmJFR6ipWYRCFZv6nvI0TAKBggqhkjOPQQDAgNIADBF
AiByuDBOlaxW6EZoTdjnjM6wSyfsPCxsJi3iAlb+IbFdeQIhAKhCSieyLpwTEt1A
5V2H4rwYNGu5Kw0KYkSr1mZ/IlNJ
-----END CERTIFICATE-----
[8b81 02-22 00:16:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos
[8b82 02-22 00:16:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType
[8b83 02-22 00:16:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize
[8b84 02-22 00:16:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout
[8b85 02-22 00:16:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers
[8b86 02-22 00:16:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions
[8b87 02-22 00:16:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities
[8b88 02-22 00:16:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos
[8b89 02-22 00:16:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints
[8b8a 02-22 00:16:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos
[8b8b 02-22 00:16:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP
[8b8c 02-22 00:16:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg
[8b8d 02-22 00:16:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance
[8b8e 02-22 00:16:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance
[8b8f 02-22 00:16:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP
[8b90 02-22 00:16:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----
MIICPjCCAeOgAwIBAgIQUu4O/3CefruTj+f4cPpoRTAKBggqhkjOPQQDAjBpMQsw
CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy
YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w
bGUuY29tMB4XDTE5MTIyODAwNTEwMFoXDTI5MTIyNTAwNTEwMFowaTELMAkGA1UE
BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz
Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv
bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABE/uMlLlw4IDRxdsdFL4HYis/uob
mR+KMPmI7UgekScAHdtCu8QNfc3ZckpPHL+cM6Hpq0cErdRcM3a3AHIgl5mjbTBr
MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw
DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgRfPbHeR9F+8Dnh3JA4jp//RddgsS
JfCRbYyrQeREkJkwCgYIKoZIzj0EAwIDSQAwRgIhAJ0ZlT8pflUizBRmqsDu6hZG
gdwvzGqJxyI5jfaeE3R3AiEAmigcSZT9QweaNF1TFfgTEng8OGKZ99fjfKhc4Afj
wBo=
-----END CERTIFICATE-----
[8b91 02-22 00:16:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
[8b92 02-22 00:16:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity
[8b93 02-22 00:16:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps)
[8b94 02-22 00:16:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps
[8b95 02-22 00:16:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP
[8b96 02-22 00:16:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP
[8b97 02-22 00:16:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP
[8b98 02-22 00:16:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP
[8b99 02-22 00:16:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP
[8b9a 02-22 00:16:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP
[8b9b 02-22 00:16:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP
[8b9c 02-22 00:16:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP
[8b9d 02-22 00:16:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP
[8b9e 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP
[8b9f 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP
[8ba0 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP
[8ba1 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application
[8ba2 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application
[8ba3 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application
[8ba4 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application
[8ba5 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application
[8ba6 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg
[8ba7 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg
[8ba8 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg
[8ba9 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer
[8baa 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer
[8bab 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer
[8bac 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer
[8bad 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel
[8bae 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel
[8baf 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel
[8bb0 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel
[8bb1 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application
[8bb2 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP
[8bb3 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP
[8bb4 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers
[8bb5 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers
[8bb6 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers
[8bb7 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins
[8bb8 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement
[8bb9 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP
[8bba 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP
[8bbb 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers
[8bbc 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins
[8bbd 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement
[8bbe 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers
[8bbf 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP
[8bc0 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP
[8bc1 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers
[8bc2 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers
[8bc3 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins
[8bc4 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement
[8bc5 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers
[8bc6 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities
[8bc7 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs
[8bc8 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers
[8bc9 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers
[8bca 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins
[8bcb 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement
[8bcc 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement
[8bcd 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer
[8bce 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg
[8bcf 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/Endpoints
[8bd0 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP
[8bd1 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers
[8bd2 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers
[8bd3 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins
[8bd4 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities
[8bd5 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType
[8bd6 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize
[8bd7 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout
[8bd8 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions
[8bd9 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins
[8bda 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation
[8bdb 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers
[8bdc 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers
[8bdd 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities
[8bde 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium
[8bdf 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm
[8be0 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure
[8be1 02-22 00:16:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses
[8be2 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers
[8be3 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins
[8be4 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers
[8be5 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers'
[8be6 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers'
[8be7 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application]
[8be8 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[8be9 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[8bea 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path []
[8beb 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP
[8bec 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP
[8bed 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP
[8bee 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers'
[8bef 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers'
[8bf0 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins'
[8bf1 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer]
[8bf2 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer
[8bf3 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application
[8bf4 02-22 00:16:40.70 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path []
[8bf5 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg
[8bf6 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation'
[8bf7 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins'
[8bf8 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers'
[8bf9 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers'
[8bfa 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V2_0 is supported and is enabled
[8bfb 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V2_0 is supported and is enabled
[8bfc 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU Processing updates for orderer endpoints channel=businesschannel
[8bfd 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> WARN Config defines both orderer org specific endpoints and global endpoints, global endpoints will be ignored channel=businesschannel
[8bfe 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU No orderer endpoint addresses or TLS certs were changed channel=businesschannel
[8bff 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel
[8c00 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel
[8c01 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]
[8c02 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]
[8c03 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: []
[8c04 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for channelID businesschannel
[8c05 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8c06 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8c07 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8c08 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8c09 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8c0a 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[8c0b 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[8c0c 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8c0d 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da9d30 gate 1582330600719519000 evaluation starts
[8c0e 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da9d30 signed by 0 principal evaluation starts (used [false])
[8c0f 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da9d30 processing identity 0 - &{Org1MSP 8be655ba89451b517544b2a241617d188129889401e79f0659d7ccb414b44486}
[8c10 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da9d30 principal evaluation succeeds for identity 0
[8c11 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da9d30 gate 1582330600719519000 evaluation succeeds
[8c12 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[8c13 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8c14 02-22 00:16:40.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8c15 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8c16 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c17 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8c18 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8c19 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8c1a 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8c1b 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8c1c 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[8c1d 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[8c1e 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8c1f 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0ac0 gate 1582330600725457500 evaluation starts
[8c20 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0ac0 signed by 0 principal evaluation starts (used [false])
[8c21 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0ac0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8c22 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8c23 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0ac0 principal evaluation fails
[8c24 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0ac0 gate 1582330600725457500 evaluation fails
[8c25 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8c26 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8c27 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8c28 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[8c29 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[8c2a 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8c2b 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec13c0 gate 1582330600728977100 evaluation starts
[8c2c 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec13c0 signed by 0 principal evaluation starts (used [false])
[8c2d 02-22 00:16:40.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec13c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8c2e 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec13c0 principal evaluation succeeds for identity 0
[8c2f 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec13c0 gate 1582330600728977100 evaluation succeeds
[8c30 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8c31 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8c32 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8c33 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8c34 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c35 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8c36 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8c37 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8c38 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8c39 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8c3a 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[8c3b 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[8c3c 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8c3d 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed0150 gate 1582330600732612600 evaluation starts
[8c3e 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed0150 signed by 0 principal evaluation starts (used [false])
[8c3f 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed0150 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8c40 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed0150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)
[8c41 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed0150 principal evaluation fails
[8c42 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed0150 gate 1582330600732612600 evaluation fails
[8c43 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers
[8c44 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8c45 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8c46 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[8c47 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[8c48 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8c49 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed0a50 gate 1582330600735274200 evaluation starts
[8c4a 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed0a50 signed by 0 principal evaluation starts (used [false])
[8c4b 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed0a50 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8c4c 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed0a50 principal evaluation succeeds for identity 0
[8c4d 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed0a50 gate 1582330600735274200 evaluation succeeds
[8c4e 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8c4f 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8c50 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8c51 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8c52 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations
[8c53 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]
[8c54 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself
[8c55 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]
[8c56 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: <nil>, Metadata:
[8c57 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8c58 02-22 00:16:40.73 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about
[8c59 02-22 00:16:40.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c5a 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8c5b 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8c5c 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8c5d 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel
[8c5e 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP]
[8c5f 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP]
[8c60 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP]
[8c61 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel
[8c62 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0034fb080 env 0xc004c24050 txn 0
[8c63 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0
[8c64 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [9] in 167ms
[8c65 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> WARN Invalid transaction type: header type is not an endorser transaction
[8c66 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting to retrieve 0 private write sets from cache. channel=businesschannel
[8c67 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU No missing collection private write sets to fetch from transient store channel=businesschannel
[8c68 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> INFO Successfully fetched all eligible collection private write sets for block [9] channel=businesschannel
[8c69 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [9]
[8c6a 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block
[8c6b 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version
[8c6c 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1]
[8c6d 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [9]
[8c6e 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock...
[8c6f 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG
[8c70 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG]
[8c71 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.ConfigTxProcessor{}
[8c72 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator
[8c73 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = []
[8c74 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG
[8c75 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results
[8c76 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution []
[8c77 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU Block [9] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]
[8c78 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"CHANNEL_CONFIG_ENV_BYTES"}:(*internal.keyOps)(0xc003ac0940)}
[8c79 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset...
[8c7a 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock...
[8c7b 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete
[8c7c 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [9]
[8c7d 02-22 00:16:40.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [9] to storage
[8c7f 02-22 00:16:40.76 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [9] to pvt block store
[8c7e 02-22 00:16:40.76 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: ""
[8c81 02-22 00:16:40.76 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme
[8c82 02-22 00:16:40.76 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 <nil>}] <nil>}
[8c83 02-22 00:16:40.76 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first"
[8c84 02-22 00:16:40.76 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003eea570, CONNECTING
[8c80 02-22 00:16:40.76 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [9]
[8c85 02-22 00:16:40.77 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [9]
[8c86 02-22 00:16:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=9, blockHash=[]byte{0x32, 0xfb, 0x43, 0x6e, 0x57, 0xee, 0xb, 0x6b, 0x3a, 0x4e, 0x3c, 0xd5, 0xae, 0x21, 0x64, 0x3f, 0xfe, 0x50, 0x96, 0xf7, 0x97, 0xa1, 0x41, 0x5a, 0xd5, 0x8a, 0x1e, 0x1f, 0xb7, 0x11, 0xde, 0xd9} txOffsets=
txId=f60d83e9351f55ab5b8cbec072fed3fb04b7881d7fd972a3f5e989caa6b87022 locPointer=offset=71, bytesLength=38008
]
[8c87 02-22 00:16:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=105717, bytesLength=38008] for tx ID: [f60d83e9351f55ab5b8cbec072fed3fb04b7881d7fd972a3f5e989caa6b87022] to txid-index
[8c88 02-22 00:16:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=105717, bytesLength=38008] for tx number:[0] ID: [f60d83e9351f55ab5b8cbec072fed3fb04b7881d7fd972a3f5e989caa6b87022] to blockNumTranNum index
[8c89 02-22 00:16:40.80 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-02-22T00:16:42.807Z grpc.peer_address=172.18.0.6:54302 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=221.4µs
[8c8a 02-22 00:16:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[144687], isChainEmpty=[false], lastBlockNumber=[9]
[8c8b 02-22 00:16:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [9] transactions to state database
[8c8c 02-22 00:16:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database
[8c8d 02-22 00:16:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database
[8c8e 02-22 00:16:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch
[8c8f 02-22 00:16:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database
[8c90 02-22 00:16:40.80 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[dCHANNEL_CONFIG_ENV_BYTES] key(bytes)=[[]byte{0x64, 0x0, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x45, 0x4e, 0x56, 0x5f, 0x42, 0x59, 0x54, 0x45, 0x53}]
[8c91 02-22 00:16:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released
[8c92 02-22 00:16:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [10]
[8c93 02-22 00:16:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xb, 0x0}]
[8c94 02-22 00:16:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [10]
[8c95 02-22 00:16:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block
[8c96 02-22 00:16:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [9] transactions to history database
[8c97 02-22 00:16:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [9] with [1] transactions
[8c98 02-22 00:16:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction
[8c99 02-22 00:16:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003eea570, READY
[8c9a 02-22 00:16:40.84 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-02-22T00:16:42.81Z grpc.peer_address=172.18.0.7:34344 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=31.7117ms
[8c9b 02-22 00:16:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[8c9c 02-22 00:16:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[8c9d 02-22 00:16:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:34344
[8c9e 02-22 00:16:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[8c9f 02-22 00:16:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[8ca0 02-22 00:16:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051
[8ca1 02-22 00:16:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\033-\316\317\252\020\230HT\305\2621\227\207D\016\037\224g}\257l1\224\340\344\277`\030QN\t" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\n9c39/yCaZdGN1KZ4nkfCncYA4rR07vJKKu1pdw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\346\275\301Z\306\337\177\302R\177H\356D\361IO\206\353\326\3060\305\201(d\377J\277\214s\257\354" from 172.18.0.7:34344
[8ca2 02-22 00:16:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ca3 02-22 00:16:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ca4 02-22 00:16:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[8ca5 02-22 00:16:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[8ca6 02-22 00:16:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[8ca7 02-22 00:16:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8ca8 02-22 00:16:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ca9 02-22 00:16:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8caa 02-22 00:16:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cab 02-22 00:16:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8cac 02-22 00:16:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8cad 02-22 00:16:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8cae 02-22 00:16:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8caf 02-22 00:16:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8cb0 02-22 00:16:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8cb1 02-22 00:16:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 55 c0 45 a2 0c 75 a8 2b 12 9b 9f 9f e2 bc 2d |.U.E..u.+......-|
00000010 c4 35 8a 2c c6 50 7a 01 37 e3 a3 c4 bf 81 b9 d2 |.5.,.Pz.7.......|
[8cb2 02-22 00:16:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 41 b9 c4 03 c0 31 f3 0e b8 48 68 |0D. 6A....1...Hh|
00000010 ab 97 93 7e 7e c0 35 48 43 d7 18 03 a7 aa 17 b7 |...~~.5HC.......|
00000020 12 cb 90 2d 02 20 62 84 a1 67 85 2d 5e 29 93 cf |...-. b..g.-^)..|
00000030 69 dc 2a 76 a3 c2 13 1d 79 d4 b5 fc 5b 74 b2 fd |i.*v....y...[t..|
00000040 c2 ed 43 60 cc 9f |..C`..|
[8cb3 02-22 00:16:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8cb4 02-22 00:16:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040928c0 gate 1582330600880834100 evaluation starts
[8cb5 02-22 00:16:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040928c0 signed by 0 principal evaluation starts (used [false])
[8cb6 02-22 00:16:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040928c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8cb7 02-22 00:16:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP
[8cb8 02-22 00:16:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[8cb9 02-22 00:16:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040928c0 principal evaluation succeeds for identity 0
[8cba 02-22 00:16:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040928c0 gate 1582330600880834100 evaluation succeeds
[8cbb 02-22 00:16:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8cbc 02-22 00:16:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8cbd 02-22 00:16:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8cbe 02-22 00:16:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8cbf 02-22 00:16:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:34344
[8cc0 02-22 00:16:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:34344
[8cc1 02-22 00:16:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[8cc2 02-22 00:16:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:34096 disconnected
[8cc3 02-22 00:16:40.88 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:34096 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2m50.7837083s
[8cc4 02-22 00:16:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[8cc5 02-22 00:16:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[8cc6 02-22 00:16:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[8cc7 02-22 00:16:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[8cc8 02-22 00:16:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:34344 disconnected
[8cc9 02-22 00:16:40.89 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-02-22T00:16:50.846Z grpc.peer_address=172.18.0.7:34344 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=43.3333ms
[8cca 02-22 00:16:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [9]
[8ccb 02-22 00:16:40.89 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [9] with 1 transaction(s) in 135ms (state_validation=0ms block_and_pvtdata_commit=49ms state_commit=4ms) commitHash=[4b449792cd924b9cffc4047c75124f71c815674eda74d0f2e25484cce033de5e]
[8ccc 02-22 00:16:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A7B121408ACB284A6AEA4E4FA15...0F0A0A5F6C6966656379636C65120131
[8cce 02-22 00:16:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F686A1031CD1406DA01924E4A3412CD38FE65769A5B725C1A64EE021E2A8CEA1
[8ccf 02-22 00:16:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [9] with 1 transaction(s)
[8ccd 02-22 00:16:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[8cd0 02-22 00:16:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[8cd1 02-22 00:16:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQQIM2ou9DqfvkKtiUOZHklTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTEyMjgwMDUxMDBaFw0yOTEyMjUwMDUxMDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEI9vXO2dg2ogF\n9G7NkteaJapySU671RiKcInNv3OAdIr+xsn11Wf7TM694Ow7/GWsGU71oZTZbHfw\ni5SfKlabMqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAg0y4VvcZCLdSplahOGKT05hcJiRUeoqVmEQhWb+p7yNEwCgYIKoZIzj0E\nAwIDRwAwRAIgHtaqhr9/bxigCyhuKqYqDztw3uE11quIZ7drkaY/mvQCIGVtipl+\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:54302
[8cd2 02-22 00:16:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"g2C\276J/\372pf\335\366\027\264\203\023\251\344S\337&\265*/\336/\t\264UU{F\310" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\335}\274\246u\3009v\251\rJG\302\340\263@\370\313\341?\326!3\350\023\320{\335\206\341V" from 172.18.0.6:54302
[8cd3 02-22 00:16:40.91 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-02-22T00:16:42.914Z grpc.peer_address=172.18.0.8:37866 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=100.6µs
[8cd4 02-22 00:16:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54072 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 4941104651651019469, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:104 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 281 bytes, Signature: 0 bytes
[8cd5 02-22 00:16:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8cd6 02-22 00:16:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 4941104651651019469, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:104 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 281 bytes, Signature: 0 bytes
[8cd7 02-22 00:16:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[8cd8 02-22 00:16:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 40 e7 19 1f 65 ed 7d b4 31 09 b4 5b 61 5e a8 16 |@...e.}.1..[a^..|
00000010 78 b7 27 23 21 7a e8 86 dc d2 48 3d 8e 09 51 8c |x.'#!z....H=..Q.|
[8cd9 02-22 00:16:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 a1 eb 65 c3 2d 16 68 46 94 2f 66 |0D. c..e.-.hF./f|
00000010 5d e6 ce 43 05 d7 5c a0 c4 5a ad 61 f6 e1 b5 68 |]..C..\..Z.a...h|
00000020 fa 6b 77 ca 02 20 07 7f 4c 36 b3 88 1d 73 b8 37 |.kw.. ..L6...s.7|
00000030 8b bf 51 2b e0 27 13 c3 d1 79 ea 17 2d 42 ad a9 |..Q+.'...y..-B..|
00000040 d5 f9 43 61 86 a0 |..Ca..|
[8cda 02-22 00:16:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[8cdb 02-22 00:16:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 e8 4a a9 4f 55 3f b4 72 b2 3e |0E.!...J.OU?.r.>|
00000010 22 ec b8 79 b9 1b 59 c3 83 9c 8b eb 07 31 d6 6b |"..y..Y......1.k|
00000020 98 4b 17 04 3d 02 20 14 51 18 14 25 4f 13 9a 65 |.K..=. .Q..%O..e|
00000030 7b e4 7b 10 82 18 fb 16 e2 89 d8 ef 20 31 90 96 |{.{......... 1..|
00000040 79 96 23 15 bd a8 37 |y.#...7|
[8cdc 02-22 00:16:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:104 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8cdd 02-22 00:16:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:104 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[8cde 02-22 00:16:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:104
[8cdf 02-22 00:16:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:104
[8ce0 02-22 00:16:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:97 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[8ce1 02-22 00:16:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ce2 02-22 00:16:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ce3 02-22 00:16:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ce4 02-22 00:16:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[8ce5 02-22 00:16:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ce6 02-22 00:16:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ce7 02-22 00:16:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ce8 02-22 00:16:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[8ce9 02-22 00:16:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 4941104651651019469, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes to 1 peers
[8cea 02-22 00:16:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[8cec 02-22 00:16:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[8ced 02-22 00:16:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[8cee 02-22 00:16:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:37866
[8cef 02-22 00:16:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\002W@\255\334\245\001k\370D\037\350\034\344yn\266[\024\252\232\377Y]\374\025\253\032\331g\272v" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nMevsRsxCuskTwdllQ6KULSbCY3SKOCD0VFYIqQ==\n-----END CERTIFICATE-----\n" tls_cert_hash:"o\3350\243\211\340\321\020so\247b\362\033\352\004\0071\321\002\217\273\202\252Cg\212\233\322\220m^" from 172.18.0.8:37866
[8cf0 02-22 00:16:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cf1 02-22 00:16:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[8cf2 02-22 00:16:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain
[8cf3 02-22 00:16:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8cf4 02-22 00:16:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cf5 02-22 00:16:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8cf6 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cf7 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8cf8 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8cf9 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\033-\316\317\252\020\230HT\305\2621\227\207D\016\037\224g}\257l1\224\340\344\277`\030QN\t" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\n9c39/yCaZdGN1KZ4nkfCncYA4rR07vJKKu1pdw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\346\275\301Z\306\337\177\302R\177H\356D\361IO\206\353\326\3060\305\201(d\377J\277\214s\257\354" from 172.18.0.7:7051
[8cfa 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cfb 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8cfc 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cfd 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8cfe 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8cff 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8d00 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8d01 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8d02 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8d03 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8d04 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8d05 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 55 c0 45 a2 0c 75 a8 2b 12 9b 9f 9f e2 bc 2d |.U.E..u.+......-|
00000010 c4 35 8a 2c c6 50 7a 01 37 e3 a3 c4 bf 81 b9 d2 |.5.,.Pz.7.......|
[8d06 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 56 06 00 f7 7f c7 f5 b3 d4 6a |0E.!..V........j|
00000010 4a 70 97 66 47 b2 d1 0a 4d 1c 15 3d 24 62 a1 d8 |Jp.fG...M..=$b..|
00000020 f1 a2 3a bc 64 02 20 4d 5b 62 f1 99 57 78 d3 f6 |..:.d. M[b..Wx..|
00000030 76 5b 49 85 05 bc 2c 85 9c 74 3c 4f 5b 0f 7f d6 |v[I...,..t<O[...|
00000040 7d 20 ba 8a 7d d0 e6 |} ..}..|
[8d07 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8d08 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004148b10 gate 1582330600945311600 evaluation starts
[8d09 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004148b10 signed by 0 principal evaluation starts (used [false])
[8d0a 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004148b10 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8d0b 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004148b10 principal evaluation succeeds for identity 0
[8d0c 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004148b10 gate 1582330600945311600 evaluation succeeds
[8d0d 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8d0e 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8d0f 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8d10 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8d11 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051
[8d12 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d14 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[8d15 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[8d13 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151062
[8d16 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EAABCDB40722870955D397BCA5503AA8DEE7483B19955F48D6F8B4A6F8774882
[8d17 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[8d18 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[8d19 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[8d1a 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c 98 cf f0 20 c7 d9 fd b9 ce d3 17 55 85 70 70 |,... .......U.pp|
00000010 b3 08 3a 82 2a 57 3b dc 6d e0 0c aa 7c 99 d3 24 |..:.*W;.m...|..$|
[8d1b 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 88 33 43 c6 9a 66 4a 2a 7d d3 |0E.!...3C..fJ*}.|
00000010 79 70 4b fa f5 ce 42 5f 7f 44 19 c1 d7 56 36 cc |ypK...B_.D...V6.|
00000020 4b 05 f4 a7 2a 02 20 35 51 02 b0 9a b5 13 7b 5c |K...*. 5Q.....{\|
00000030 f0 32 32 71 67 98 f7 b2 cc 9b f8 68 a6 32 d2 5c |.22qg......h.2.\|
00000040 49 d0 4c f5 30 88 3f |I.L.0.?|
[8d1c 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:54302
[8d1d 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:54302
[8d1e 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[8d1f 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:54072 disconnected
[8d20 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:54072 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2m49.4143281s
[8d21 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[8d22 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:54302 disconnected
[8d23 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-02-22T00:16:50.841Z grpc.peer_address=172.18.0.6:54302 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=57.1487ms
[8d24 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[8d25 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[8d26 02-22 00:16:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8d27 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8d28 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8d29 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8d2a 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 de 4a 51 e9 bc de 50 f6 fa c0 37 5e a6 ad f2 |..JQ...P...7^...|
00000010 cc 1a 7d 8f b0 fc 1c d6 5b b3 db 0f 40 60 ef 6f |..}.....[...@`.o|
[8d2b 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 23 4b 2e f3 cb 82 50 c2 81 97 32 |0D. u#K....P...2|
00000010 f9 5e 4d 60 b5 2a 7d 3c ac 84 6a fc 67 a0 50 f7 |.^M`.*}<..j.g.P.|
00000020 c5 c2 91 df 02 20 7e e4 d6 27 ca 17 36 07 68 c4 |..... ~..'..6.h.|
00000030 d2 51 7b 21 f6 ea c2 76 6f 04 89 5f b2 4a 5a 41 |.Q{!...vo.._.JZA|
00000040 85 44 62 33 a2 3f |.Db3.?|
[8d2c 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8d2d 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415d6c0 gate 1582330600953071100 evaluation starts
[8d2e 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415d6c0 signed by 0 principal evaluation starts (used [false])
[8d2f 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415d6c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8d30 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP
[8d31 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity
[8d32 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415d6c0 principal evaluation succeeds for identity 0
[8d33 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415d6c0 gate 1582330600953071100 evaluation succeeds
[8d34 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8d35 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8d36 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8d37 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8d38 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d39 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:37866
[8d3a 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:37866
[8d3b 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Closing reading from stream
[8d3c 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[8d3d 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 17296132737243212162, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:98 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes to 1 peers
[8d3e 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[8d3f 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 17296132737243212162, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:98 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes
[8d40 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[8d41 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[8ceb 02-22 00:16:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 4941104651651019469, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes
[8d42 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[8d43 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: ""
[8d44 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme
[8d45 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: ""
[8d46 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme
[8d47 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending update to cc: {[{peer1.org1.example.com:7051 0 <nil>}] <nil>}
[8d48 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first"
[8d49 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0041b42c0, CONNECTING
[8d4a 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending update to cc: {[{peer0.org2.example.com:7051 0 <nil>}] <nil>}
[8d4b 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first"
[8d4c 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[8d4d 02-22 00:16:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00419ba00, CONNECTING
[8d4e 02-22 00:16:40.96 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[8d4f 02-22 00:16:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00419ba00, READY
[8d50 02-22 00:16:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0041b42c0, READY
[8d51 02-22 00:16:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[8d52 02-22 00:16:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[8d53 02-22 00:16:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[8d54 02-22 00:16:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:7051
[8d55 02-22 00:16:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled
[8d56 02-22 00:16:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[8d57 02-22 00:16:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:7051
[8d59 02-22 00:16:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[8d5a 02-22 00:16:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"g2C\276J/\372pf\335\366\027\264\203\023\251\344S\337&\265*/\336/\t\264UU{F\310" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n2V46NzLoCm8sAXKYAKp9KQtANPw5s1hOdxhUHg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\335}\274\246u\3009v\251\rJG\302\340\263@\370\313\341?\326!3\350\023\320{\335\206\341V" from 172.18.0.6:7051
[8d5b 02-22 00:16:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c 98 cf f0 20 c7 d9 fd b9 ce d3 17 55 85 70 70 |,... .......U.pp|
00000010 b3 08 3a 82 2a 57 3b dc 6d e0 0c aa 7c 99 d3 24 |..:.*W;.m...|..$|
[8d5c 02-22 00:16:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 2b ca e5 bb c2 bb df 3a 15 20 |0E.!..+......:. |
00000010 87 d4 dd 53 67 78 dd 23 d5 6e 1f 61 97 5b 89 87 |...Sgx.#.n.a.[..|
00000020 0f bd 1c 7e 2e 02 20 15 b0 37 c9 e1 31 80 74 ba |...~.. ..7..1.t.|
00000030 b1 1e c2 3b 81 89 96 59 ad f8 7a 74 0e 3d a4 85 |...;...Y..zt.=..|
00000040 8a 94 51 bf 4f e5 68 |..Q.O.h|
[8d5d 02-22 00:16:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051
[8d5e 02-22 00:16:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d5f 02-22 00:16:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[8d60 02-22 00:16:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d61 02-22 00:16:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\033-\316\317\252\020\230HT\305\2621\227\207D\016\037\224g}\257l1\224\340\344\277`\030QN\t" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAI5BTfE0ETqLjuTa7tX8rQIwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkxMjI4MDA1MTAwWhcNMjkxMjI1MDA1MTAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABJ+P1Nsaoy0d\nVEeyPeIrNCTqfnL6dGeshDvRX0Os6OBYMwrXkXRWg4YEmIwNXSL8cJwap+6afMfK\ncXUDe2tozNWjTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIFXg282MUjb2oOUasFo56uMuXM4YvgWMtT2OrWxN45eVMAoGCCqGSM49\nBAMCA0cAMEQCIDNaYLNeEYHf4nHOlgKoUFdzwN/m3kL67eHTnCx2SG3lAiBDx9YX\n9c39/yCaZdGN1KZ4nkfCncYA4rR07vJKKu1pdw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\346\275\301Z\306\337\177\302R\177H\356D\361IO\206\353\326\3060\305\201(d\377J\277\214s\257\354" from 172.18.0.7:7051
[8d62 02-22 00:16:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d63 02-22 00:16:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8d64 02-22 00:16:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d65 02-22 00:16:40.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8d66 02-22 00:16:40.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d58 02-22 00:16:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:37866 disconnected
[8d68 02-22 00:16:40.99 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-02-22T00:16:50.932Z grpc.peer_address=172.18.0.8:37866 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=59.2905ms
[8d67 02-22 00:16:40.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8d6a 02-22 00:16:40.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8d6b 02-22 00:16:40.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8d6c 02-22 00:16:40.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8d6d 02-22 00:16:40.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8d6e 02-22 00:16:40.99 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream
[8d69 02-22 00:16:40.99 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[8d6f 02-22 00:16:40.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8d70 02-22 00:16:40.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 55 c0 45 a2 0c 75 a8 2b 12 9b 9f 9f e2 bc 2d |.U.E..u.+......-|
00000010 c4 35 8a 2c c6 50 7a 01 37 e3 a3 c4 bf 81 b9 d2 |.5.,.Pz.7.......|
[8d71 02-22 00:16:41.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 34 6b 5d 68 ea 33 03 ef 3f cc |0E.!..4k]h.3..?.|
00000010 ce 06 31 db 07 02 44 c2 75 2d 7a c0 e1 e4 63 ab |..1...D.u-z...c.|
00000020 41 82 21 d3 38 02 20 71 6f e6 8c 92 88 3e 5c d2 |A.!.8. qo....>\.|
00000030 d1 92 1a 7d 4f 59 39 9c a7 64 7b 61 b2 88 d2 83 |...}OY9..d{a....|
00000040 3d 2b 28 76 ea 7c ef |=+(v.|.|
[8d72 02-22 00:16:41.00 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8d73 02-22 00:16:41.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cf410 gate 1582330601003961900 evaluation starts
[8d74 02-22 00:16:41.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cf410 signed by 0 principal evaluation starts (used [false])
[8d75 02-22 00:16:41.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cf410 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8d76 02-22 00:16:41.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cf410 principal evaluation succeeds for identity 0
[8d77 02-22 00:16:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cf410 gate 1582330601003961900 evaluation succeeds
[8d78 02-22 00:16:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8d79 02-22 00:16:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8d7a 02-22 00:16:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8d7b 02-22 00:16:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8d7c 02-22 00:16:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051
[8d7d 02-22 00:16:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d7e 02-22 00:16:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[8d7f 02-22 00:16:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d80 02-22 00:16:41.02 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-02-22T00:16:43.019Z grpc.peer_address=172.18.0.8:37874 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=113.7µs
[8d81 02-22 00:16:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A20C4A11870756AF4C87C...71B81AA133B3FABEEBC3BA1E619ADDF7
[8d82 02-22 00:16:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC719A12D6A5F374E71B8E1995B4758C94B271CD1D459B537E367600DDA38CD6
[8d83 02-22 00:16:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:<pki_id:"\304\241\030puj\364\310|\031[ZZ\221s\324\222\026\303\315\2179\370\373\227\361\377\306\212\227\366\351" identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nO8Vy84ulTRlvtafD5eVJuq6IrP9BroFxu1DJ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\0366\264\377\270\203\315\010\230\375\304^\330\263\334\251q\270\032\2413\263\372\276\353\303\272\036a\232\335\367" > , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:37874
[8d84 02-22 00:16:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\002W@\255\334\245\001k\370D\037\350\034\344yn\266[\024\252\232\377Y]\374\025\253\032\331g\272v" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nMevsRsxCuskTwdllQ6KULSbCY3SKOCD0VFYIqQ==\n-----END CERTIFICATE-----\n" tls_cert_hash:"o\3350\243\211\340\321\020so\247b\362\033\352\004\0071\321\002\217\273\202\252Cg\212\233\322\220m^" from 172.18.0.8:37874
[8d85 02-22 00:16:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d86 02-22 00:16:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8d87 02-22 00:16:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d88 02-22 00:16:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8d89 02-22 00:16:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8d8a 02-22 00:16:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8d8b 02-22 00:16:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8d8c 02-22 00:16:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8d8d 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8d8e 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8d8f 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8d90 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 de 4a 51 e9 bc de 50 f6 fa c0 37 5e a6 ad f2 |..JQ...P...7^...|
00000010 cc 1a 7d 8f b0 fc 1c d6 5b b3 db 0f 40 60 ef 6f |..}.....[...@`.o|
[8d91 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 af 36 6f ac cc e2 f2 e8 1b 5a 0e |0D. P.6o......Z.|
00000010 75 c1 19 4a d0 bb 2f 27 bb 1c de 8f 9e 21 07 1f |u..J../'.....!..|
00000020 cc a1 fd cc 02 20 0f b5 60 ef af 37 d3 12 b0 d4 |..... ..`..7....|
00000030 6d 3b 0a 60 f3 09 9f 36 2b 11 c4 b2 05 fa 90 b3 |m;.`...6+.......|
00000040 28 3b 30 89 24 67 |(;0.$g|
[8d92 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8d93 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004512720 gate 1582330601034665500 evaluation starts
[8d94 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004512720 signed by 0 principal evaluation starts (used [false])
[8d95 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004512720 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8d96 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004512720 principal evaluation succeeds for identity 0
[8d97 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004512720 gate 1582330601034665500 evaluation succeeds
[8d98 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8d99 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8d9a 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8d9b 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8d9c 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:37874
[8d9d 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 17296132737243212162, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes
[8d9f 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 17296132737243212162, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes
[8da0 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8d9e 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:37874
[8da1 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 17296132737243212162, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes
[8da2 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[8da3 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea ab cd b4 07 22 87 09 55 d3 97 bc a5 50 3a a8 |....."..U....P:.|
00000010 de e7 48 3b 19 95 5f 48 d6 f8 b4 a6 f8 77 48 82 |..H;.._H.....wH.|
[8da4 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 f0 f1 33 44 00 cb 02 a8 29 f0 1f |0D. 8..3D....)..|
00000010 62 d2 85 4e 43 70 53 17 65 71 2a d8 18 6a ce 70 |b..NCpS.eq*..j.p|
00000020 aa 60 bc 11 02 20 47 cb 89 4c ee 1f dd 7d 6d 4d |.`... G..L...}mM|
00000030 ee 4a 57 85 52 d6 7c 9b 00 d8 c9 70 65 4e 45 49 |.JW.R.|....peNEI|
00000040 34 b9 01 82 dc fd |4.....|
[8da5 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:98 , Envelope: 83 bytes, Signature: 70 bytes
[8da6 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:98 , Envelope: 83 bytes, Signature: 70 bytes
[8da7 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8da8 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 15934014617851444005, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[8da9 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[8daa 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8dab 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8dac 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8dad 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8dae 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8daf 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8db0 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8db1 02-22 00:16:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 dd f6 e6 37 b1 ea d8 c0 c0 53 f2 e3 b1 3f 6f |....7.....S...?o|
00000010 ac 0c 65 42 b5 94 52 64 8c fd 16 61 d9 d1 e4 f8 |..eB..Rd...a....|
[8db2 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 92 de 9a 25 5d 32 5e 1c 5c 87 |0E.!.....%]2^.\.|
00000010 27 da 86 70 75 53 f4 c6 6b 39 32 31 cd 78 27 c1 |'..puS..k921.x'.|
00000020 28 64 b4 62 1e 02 20 42 71 33 a4 0b c0 46 bc e5 |(d.b.. Bq3...F..|
00000030 5b d7 a0 02 19 3d 22 24 6d 13 8e f9 ff b4 b8 d5 |[....="$m.......|
00000040 38 fb a5 93 6a 35 94 |8...j5.|
[8db3 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8db4 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045323c0 gate 1582330601040147600 evaluation starts
[8db5 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045323c0 signed by 0 principal evaluation starts (used [false])
[8db6 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045323c0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8db7 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045323c0 principal evaluation succeeds for identity 0
[8db8 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045323c0 gate 1582330601040147600 evaluation succeeds
[8db9 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8dba 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8dbb 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8dbc 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8dbd 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:102 , Envelope: 83 bytes, Signature: 71 bytes
[8dbe 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:102 , Envelope: 83 bytes, Signature: 71 bytes]}
[8dbf 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:102
[8dc0 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:102
[8dc1 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:96 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[8dc2 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8dc3 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8dc4 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8dc5 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8dc6 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 15934014617851444005, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes
[8dc7 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[8dc8 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8dc9 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8dca 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8dcb 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8dcc 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8dcd 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8dce 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8dcf 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d 41 b0 bd e3 d9 18 d9 98 ae 00 bb aa 1c 45 e9 |mA............E.|
00000010 9d 1a 84 2d 83 a9 56 1f 21 2b 96 6e 69 db 88 2f |...-..V.!+.ni../|
[8dd0 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea a1 58 34 41 4a f3 27 9e 45 d8 |0E.!...X4AJ.'.E.|
00000010 f5 a8 a6 e8 b9 d7 03 99 36 07 9f dd 00 03 fa 5d |........6......]|
00000020 28 61 2c fa 1c 02 20 20 91 d2 c2 5a 67 52 c8 b8 |(a,... ...ZgR..|
00000030 25 5d 2d 21 78 71 3d 36 2f bd 68 ad c3 1c fe 5d |%]-!xq=6/.h....]|
00000040 a2 f1 5a 8b 94 f9 29 |..Z...)|
[8dd1 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8dd2 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045487a0 gate 1582330601045044200 evaluation starts
[8dd3 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045487a0 signed by 0 principal evaluation starts (used [false])
[8dd4 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045487a0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8dd5 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045487a0 principal evaluation succeeds for identity 0
[8dd6 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045487a0 gate 1582330601045044200 evaluation succeeds
[8dd7 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8dd8 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8dd9 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8dda 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8ddb 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[8ddc 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes]}
[8ddd 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:103
[8dde 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:103
[8ddf 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:102 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[8de0 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8de1 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8de2 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8de3 02-22 00:16:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[8de4 02-22 00:16:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8de5 02-22 00:16:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8de6 02-22 00:16:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8de7 02-22 00:16:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 15934014617851444005, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers
[8de8 02-22 00:16:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[8de9 02-22 00:16:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 15934014617851444005, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes
[8dea 02-22 00:16:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8deb 02-22 00:16:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:9718293562573634050 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8dec 02-22 00:16:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:9718293562573634050 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8ded 02-22 00:16:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:9718293562573634050 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8dee 02-22 00:16:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8def 02-22 00:16:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8df0 02-22 00:16:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8df1 02-22 00:16:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8df2 02-22 00:16:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8df3 02-22 00:16:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8df4 02-22 00:16:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[8df5 02-22 00:16:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8df6 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[8df7 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[8df8 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8df9 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[8dfa 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[8dfb 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 06 60 b9 d4 6f a6 dc 54 87 18 ec 01 1e 19 1c |F.`..o..T.......|
00000010 ee 4f e2 2b ca 5b 08 01 50 62 69 99 69 ef 9a 1f |.O.+.[..Pbi.i...|
[8dfc 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 7d c9 d4 5f 44 52 15 d9 4e 06 |0E.!..}.._DR..N.|
00000010 f4 e4 8b cd 53 0a e1 fa 6e 07 23 a7 38 46 e5 bb |....S...n.#.8F..|
00000020 54 f1 0d 59 a0 02 20 43 72 d6 67 1b 7d 81 87 cf |T..Y.. Cr.g.}...|
00000030 74 e2 79 e3 3d 71 2d 88 dd 84 ca 7f 47 83 cf 91 |t.y.=q-.....G...|
00000040 e2 ca e0 12 38 38 2f |....88/|
[8dfd 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[8dfe 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 71 46 68 ed 56 27 08 54 45 b0 6d |0D. .qFh.V'.TE.m|
00000010 8c 1b 18 63 f0 d3 67 f3 6c 66 a4 6e cc e2 2a 99 |...c..g.lf.n..*.|
00000020 7f d0 3f 2c 02 20 49 52 bb a8 e0 06 01 77 04 35 |..?,. IR.....w.5|
00000030 51 29 36 dd af ba e2 8b 2d e4 4e 92 f4 e1 0a 6e |Q)6.....-.N....n|
00000040 88 f0 da c7 33 cc |....3.|
[8dff 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[8e00 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[8e01 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:105
[8e02 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:105
[8e03 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:104 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[8e04 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e05 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e06 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e07 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[8e08 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e09 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e0a 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers
[8e0b 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[8e0c 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[8e0d 02-22 00:16:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e0e 02-22 00:16:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:4518468502444494538 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8e0f 02-22 00:16:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:4518468502444494538 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8e10 02-22 00:16:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:4518468502444494538 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8e11 02-22 00:16:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[8e12 02-22 00:16:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e13 02-22 00:16:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:8582381535716810768 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8e14 02-22 00:16:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:8582381535716810768 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8e15 02-22 00:16:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e16 02-22 00:16:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e17 02-22 00:16:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e18 02-22 00:16:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e19 02-22 00:16:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e1a 02-22 00:16:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e1b 02-22 00:16:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[8e1c 02-22 00:16:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e1d 02-22 00:16:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[8e1e 02-22 00:16:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2973144112160684425 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[8e1f 02-22 00:16:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[8e20 02-22 00:16:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:12089325921945029046 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[8e21 02-22 00:16:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[8e22 02-22 00:16:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:7576592962684590053 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[8e24 02-22 00:16:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:7576592962684590053 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8e25 02-22 00:16:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e23 02-22 00:16:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2973144112160684425 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[8e26 02-22 00:16:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e27 02-22 00:16:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:12089325921945029046 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[8e28 02-22 00:16:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e29 02-22 00:16:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7576592962684590053 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[8e2a 02-22 00:16:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7576592962684590053 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[8e2b 02-22 00:16:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7576592962684590053 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[8e2c 02-22 00:16:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e2d 02-22 00:16:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12089325921945029046 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[8e2e 02-22 00:16:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12089325921945029046 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[8e2f 02-22 00:16:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12089325921945029046 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[8e30 02-22 00:16:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e31 02-22 00:16:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2973144112160684425 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[8e32 02-22 00:16:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2973144112160684425 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[8e33 02-22 00:16:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e34 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:104 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8e35 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e36 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:104 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8e37 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[8e38 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e39 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8e3a 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8e3b 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8e3c 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8e3d 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8e3e 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8e3f 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 63 e1 02 ee 16 9f 86 43 79 05 2d 6f 22 dc 98 |.c......Cy.-o"..|
00000010 ca e7 bd 80 72 e6 4b f7 8e 91 23 e4 9b d6 c0 20 |....r.K...#.... |
[8e40 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f 0a 78 97 1f fe f0 72 d4 52 c2 55 |0D. ..x....r.R.U|
00000010 7b 18 22 8c 15 69 c9 73 6c 1b 83 ed cc df 2d ce |{."..i.sl.....-.|
00000020 23 b0 a1 b8 02 20 6b 4f 44 27 68 64 85 e1 0d a4 |#.... kOD'hd....|
00000030 00 bc 81 b6 95 6d 05 e9 63 3f 29 24 2e c5 bc f5 |.....m..c?)$....|
00000040 a0 ce 5a 52 b9 a4 |..ZR..|
[8e41 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8e42 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004599f20 gate 1582330602476871500 evaluation starts
[8e43 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004599f20 signed by 0 principal evaluation starts (used [false])
[8e44 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004599f20 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8e45 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004599f20 principal evaluation succeeds for identity 0
[8e46 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004599f20 gate 1582330602476871500 evaluation succeeds
[8e47 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8e48 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8e49 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8e4a 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8e4b 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:104 , Envelope: 83 bytes, Signature: 70 bytes
[8e4c 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:104 , Envelope: 83 bytes, Signature: 70 bytes]}
[8e4d 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:104
[8e4e 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:104
[8e4f 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[8e50 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e51 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e52 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e53 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[8e54 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e55 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e56 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e57 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[8e58 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[8e59 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8e5a 02-22 00:16:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e5b 02-22 00:16:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151063
[8e5c 02-22 00:16:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 53F2D7579619DBEACF304B9F4B5F1D5BC81615698F2164738FF140778CCB5062
[8e5d 02-22 00:16:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[8e5e 02-22 00:16:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[8e5f 02-22 00:16:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e60 02-22 00:16:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[8e61 02-22 00:16:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers
[8e62 02-22 00:16:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e63 02-22 00:16:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[8e65 02-22 00:16:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[8e66 02-22 00:16:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e67 02-22 00:16:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[8e68 02-22 00:16:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e64 02-22 00:16:42.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[8e69 02-22 00:16:42.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e6a 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[8e6b 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[8e6c 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e6d 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes
[8e6e 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[8e6f 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 f2 d7 57 96 19 db ea cf 30 4b 9f 4b 5f 1d 5b |S..W.....0K.K_.[|
00000010 c8 16 15 69 8f 21 64 73 8f f1 40 77 8c cb 50 62 |...i.!ds..@w..Pb|
[8e70 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9a 97 19 c7 f1 cb 03 68 a4 17 4e |0E.!........h..N|
00000010 f7 44 99 19 86 07 38 44 7b ba a0 8d 4a d0 1a 76 |.D....8D{...J..v|
00000020 ec 73 ad f7 33 02 20 6b d4 2e d1 c9 a4 66 54 95 |.s..3. k.....fT.|
00000030 04 40 be 36 fb 09 c7 2e 41 55 66 9d 17 d7 ea 2e |.@.6....AUf.....|
00000040 ba 6f f3 89 b3 02 d8 |.o.....|
[8e71 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[8e72 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 4b 99 b7 6a 78 0f c7 33 1f fd |0E.!..K..jx..3..|
00000010 37 d4 e3 ba 86 86 5f 78 20 c4 86 c0 d7 e0 1d 75 |7....._x ......u|
00000020 f5 7a ac b7 a8 02 20 28 fd 77 0e 29 af e4 ea b7 |.z.... (.w.)....|
00000030 87 4e 4b c4 c7 c8 28 9b aa 78 74 4f 0d 2d 46 a1 |.NK...(..xtO.-F.|
00000040 59 e3 5e e6 da 51 45 |Y.^..QE|
[8e73 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8e74 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[8e75 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e76 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e77 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8e78 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8e79 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e7a 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8e7b 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[8e7c 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8e7d 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8e7e 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8e7f 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8e80 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8e81 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8e82 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8e83 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 63 e1 02 ee 16 9f 86 43 79 05 2d 6f 22 dc 98 |.c......Cy.-o"..|
00000010 ca e7 bd 80 72 e6 4b f7 8e 91 23 e4 9b d6 c0 20 |....r.K...#.... |
[8e84 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f 0a 78 97 1f fe f0 72 d4 52 c2 55 |0D. ..x....r.R.U|
00000010 7b 18 22 8c 15 69 c9 73 6c 1b 83 ed cc df 2d ce |{."..i.sl.....-.|
00000020 23 b0 a1 b8 02 20 6b 4f 44 27 68 64 85 e1 0d a4 |#.... kOD'hd....|
00000030 00 bc 81 b6 95 6d 05 e9 63 3f 29 24 2e c5 bc f5 |.....m..c?)$....|
00000040 a0 ce 5a 52 b9 a4 |..ZR..|
[8e85 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8e86 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045cf980 gate 1582330602567019400 evaluation starts
[8e87 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045cf980 signed by 0 principal evaluation starts (used [false])
[8e88 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045cf980 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8e89 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045cf980 principal evaluation succeeds for identity 0
[8e8a 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045cf980 gate 1582330602567019400 evaluation succeeds
[8e8b 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8e8c 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8e8d 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8e8e 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8e8f 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8e90 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:104 , Envelope: 83 bytes, Signature: 70 bytes
[8e91 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e92 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[8e93 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 f2 d7 57 96 19 db ea cf 30 4b 9f 4b 5f 1d 5b |S..W.....0K.K_.[|
00000010 c8 16 15 69 8f 21 64 73 8f f1 40 77 8c cb 50 62 |...i.!ds..@w..Pb|
[8e94 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9a 97 19 c7 f1 cb 03 68 a4 17 4e |0E.!........h..N|
00000010 f7 44 99 19 86 07 38 44 7b ba a0 8d 4a d0 1a 76 |.D....8D{...J..v|
00000020 ec 73 ad f7 33 02 20 6b d4 2e d1 c9 a4 66 54 95 |.s..3. k.....fT.|
00000030 04 40 be 36 fb 09 c7 2e 41 55 66 9d 17 d7 ea 2e |.@.6....AUf.....|
00000040 ba 6f f3 89 b3 02 d8 |.o.....|
[8e95 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes
[8e96 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes
[8e97 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e98 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[8e99 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 06 60 b9 d4 6f a6 dc 54 87 18 ec 01 1e 19 1c |F.`..o..T.......|
00000010 ee 4f e2 2b ca 5b 08 01 50 62 69 99 69 ef 9a 1f |.O.+.[..Pbi.i...|
[8e9a 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 7d c9 d4 5f 44 52 15 d9 4e 06 |0E.!..}.._DR..N.|
00000010 f4 e4 8b cd 53 0a e1 fa 6e 07 23 a7 38 46 e5 bb |....S...n.#.8F..|
00000020 54 f1 0d 59 a0 02 20 43 72 d6 67 1b 7d 81 87 cf |T..Y.. Cr.g.}...|
00000030 74 e2 79 e3 3d 71 2d 88 dd 84 ca 7f 47 83 cf 91 |t.y.=q-.....G...|
00000040 e2 ca e0 12 38 38 2f |....88/|
[8e9b 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes
[8e9c 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e9d 02-22 00:16:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8e9e 02-22 00:16:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8e9f 02-22 00:16:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[8ea0 02-22 00:16:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ea1 02-22 00:16:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 f2 d7 57 96 19 db ea cf 30 4b 9f 4b 5f 1d 5b |S..W.....0K.K_.[|
00000010 c8 16 15 69 8f 21 64 73 8f f1 40 77 8c cb 50 62 |...i.!ds..@w..Pb|
[8ea2 02-22 00:16:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9a 97 19 c7 f1 cb 03 68 a4 17 4e |0E.!........h..N|
00000010 f7 44 99 19 86 07 38 44 7b ba a0 8d 4a d0 1a 76 |.D....8D{...J..v|
00000020 ec 73 ad f7 33 02 20 6b d4 2e d1 c9 a4 66 54 95 |.s..3. k.....fT.|
00000030 04 40 be 36 fb 09 c7 2e 41 55 66 9d 17 d7 ea 2e |.@.6....AUf.....|
00000040 ba 6f f3 89 b3 02 d8 |.o.....|
[8ea3 02-22 00:16:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes
[8ea4 02-22 00:16:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:99 , Envelope: 83 bytes, Signature: 71 bytes
[8ea5 02-22 00:16:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ea6 02-22 00:16:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[8ea7 02-22 00:16:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 06 60 b9 d4 6f a6 dc 54 87 18 ec 01 1e 19 1c |F.`..o..T.......|
00000010 ee 4f e2 2b ca 5b 08 01 50 62 69 99 69 ef 9a 1f |.O.+.[..Pbi.i...|
[8ea8 02-22 00:16:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 7d c9 d4 5f 44 52 15 d9 4e 06 |0E.!..}.._DR..N.|
00000010 f4 e4 8b cd 53 0a e1 fa 6e 07 23 a7 38 46 e5 bb |....S...n.#.8F..|
00000020 54 f1 0d 59 a0 02 20 43 72 d6 67 1b 7d 81 87 cf |T..Y.. Cr.g.}...|
00000030 74 e2 79 e3 3d 71 2d 88 dd 84 ca 7f 47 83 cf 91 |t.y.=q-.....G...|
00000040 e2 ca e0 12 38 38 2f |....88/|
[8ea9 02-22 00:16:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes
[8eaa 02-22 00:16:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8eab 02-22 00:16:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8eac 02-22 00:16:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8ead 02-22 00:16:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8eae 02-22 00:16:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8eaf 02-22 00:16:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[8eb0 02-22 00:16:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[8eb1 02-22 00:16:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8eb2 02-22 00:16:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8eb3 02-22 00:16:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8eb4 02-22 00:16:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8eb5 02-22 00:16:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8eb6 02-22 00:16:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8eb7 02-22 00:16:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8eb8 02-22 00:16:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de af 1a 93 70 10 a1 99 31 8c 1c 3e 5c 9a ef 5f |....p...1..>\.._|
00000010 9a b6 93 7d ba 54 2f b8 f5 9e f7 02 9a f6 f2 17 |...}.T/.........|
[8eb9 02-22 00:16:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 e6 96 cb 3e cc f5 12 f3 b9 95 74 |0D. P...>......t|
00000010 c3 f2 e1 7c 7e e7 ec cc 40 aa 9d 13 d3 58 8f c2 |...|~...@....X..|
00000020 e5 ff 70 64 02 20 08 9e dc 1b c6 6d 9b 6a 8a 69 |..pd. .....m.j.i|
00000030 4e d7 6d 89 e3 a2 e2 c8 ed 67 3d c1 20 d9 30 3d |N.m......g=. .0=|
00000040 24 49 6d 81 55 3d |$Im.U=|
[8eba 02-22 00:16:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8ebb 02-22 00:16:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046446c0 gate 1582330602629925600 evaluation starts
[8ebc 02-22 00:16:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046446c0 signed by 0 principal evaluation starts (used [false])
[8ebd 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046446c0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8ebe 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046446c0 principal evaluation succeeds for identity 0
[8ebf 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046446c0 gate 1582330602629925600 evaluation succeeds
[8ec0 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8ec1 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8ec2 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8ec3 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8ec4 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes
[8ec5 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes]}
[8ec6 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:100
[8ec7 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:100
[8ec8 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:94 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[8ec9 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8eca 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ecb 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ecc 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[8ecd 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ece 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ecf 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ed0 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[8ed1 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[8ed2 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[8ed3 02-22 00:16:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ed4 02-22 00:16:42.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ed5 02-22 00:16:42.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ed6 02-22 00:16:42.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[8ed7 02-22 00:16:42.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[8ed8 02-22 00:16:42.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ed9 02-22 00:16:42.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[8edb 02-22 00:16:42.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8eda 02-22 00:16:42.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[8edc 02-22 00:16:42.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8edd 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ede 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8edf 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[8ee1 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ee2 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 bb f9 b3 ae 00 00 35 24 2f dd 01 a1 9c da |........5$/.....|
00000010 b8 7f 78 86 f1 13 01 38 9e 43 2c 9a 0b 7f 81 7c |..x....8.C,....||
[8ee3 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae ef 65 ca 50 56 7d 82 bf 1b 33 |0E.!...e.PV}...3|
00000010 82 6c c3 71 1b f1 c2 20 4b a1 36 7c 0d 4c ff 33 |.l.q... K.6|.L.3|
00000020 dd 20 f8 dc 1b 02 20 5d 61 08 72 e0 77 a4 af 78 |. .... ]a.r.w..x|
00000030 36 f3 f9 99 83 58 00 26 0e b3 e0 ce f7 5d e8 9b |6....X.&.....]..|
00000040 b3 e8 92 8b 7f 34 50 |.....4P|
[8ee0 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330600893922500 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes to 3 peers
[8ee4 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[8ee7 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[8ee8 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ee9 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8eea 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330600893922500 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[8eeb 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8eec 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8eed 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8eee 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8eef 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8ef0 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8ef1 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8ef2 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[8ef3 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[8ef4 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8ef5 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690670 gate 1582330602950432500 evaluation starts
[8ef6 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690670 signed by 0 principal evaluation starts (used [false])
[8ef7 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690670 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8ef8 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690670 principal evaluation succeeds for identity 0
[8ef9 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690670 gate 1582330602950432500 evaluation succeeds
[8efa 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330600893922500 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[8efb 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8efd 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8ee6 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330600893922500 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[8efc 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ee5 02-22 00:16:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f01 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8efe 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8f02 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8f03 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f04 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f05 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8f06 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8f07 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8f08 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8f09 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8eff 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8f00 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[8f0a 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8f0b 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 15 38 8b 9a e7 29 80 9d f9 29 1a e9 47 dc ad |..8...)...)..G..|
00000010 62 d0 bd 0a 18 0b a3 34 46 19 36 66 3f 70 be a6 |b......4F.6f?p..|
[8f0c 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 4a 79 9c 97 e2 27 1a 3e 2a 57 1e |0D. [Jy...'.>*W.|
00000010 35 09 ab 03 01 02 1d da 08 bf 41 10 a4 3e a3 51 |5.........A..>.Q|
00000020 a1 e0 eb 6f 02 20 12 84 80 d4 00 41 62 ac 00 e9 |...o. .....Ab...|
00000030 b3 36 5b 47 66 68 62 f3 81 f6 26 3c 19 a8 46 65 |.6[Gfhb...&<..Fe|
00000040 59 5a 7c 7e 54 23 |YZ|~T#|
[8f0d 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f0e 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ac2f0 gate 1582330602959002600 evaluation starts
[8f0f 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ac2f0 signed by 0 principal evaluation starts (used [false])
[8f10 02-22 00:16:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ac2f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8f11 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ac2f0 principal evaluation succeeds for identity 0
[8f12 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ac2f0 gate 1582330602959002600 evaluation succeeds
[8f13 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8f14 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8f15 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8f16 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8f17 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f18 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8f19 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8f1a 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8f1b 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8f1c 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8f1d 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 15 38 8b 9a e7 29 80 9d f9 29 1a e9 47 dc ad |..8...)...)..G..|
00000010 62 d0 bd 0a 18 0b a3 34 46 19 36 66 3f 70 be a6 |b......4F.6f?p..|
[8f1e 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 4a 79 9c 97 e2 27 1a 3e 2a 57 1e |0D. [Jy...'.>*W.|
00000010 35 09 ab 03 01 02 1d da 08 bf 41 10 a4 3e a3 51 |5.........A..>.Q|
00000020 a1 e0 eb 6f 02 20 12 84 80 d4 00 41 62 ac 00 e9 |...o. .....Ab...|
00000030 b3 36 5b 47 66 68 62 f3 81 f6 26 3c 19 a8 46 65 |.6[Gfhb...&<..Fe|
00000040 59 5a 7c 7e 54 23 |YZ|~T#|
[8f1f 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f20 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ad080 gate 1582330602964268300 evaluation starts
[8f21 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ad080 signed by 0 principal evaluation starts (used [false])
[8f22 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ad080 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8f23 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ad080 principal evaluation succeeds for identity 0
[8f24 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ad080 gate 1582330602964268300 evaluation succeeds
[8f25 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8f26 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8f27 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8f28 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8f29 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8f2a 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 842 bytes, Signature: 0 bytes
[8f2b 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f2c 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 bb f9 b3 ae 00 00 35 24 2f dd 01 a1 9c da |........5$/.....|
00000010 b8 7f 78 86 f1 13 01 38 9e 43 2c 9a 0b 7f 81 7c |..x....8.C,....||
[8f2d 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae ef 65 ca 50 56 7d 82 bf 1b 33 |0E.!...e.PV}...3|
00000010 82 6c c3 71 1b f1 c2 20 4b a1 36 7c 0d 4c ff 33 |.l.q... K.6|.L.3|
00000020 dd 20 f8 dc 1b 02 20 5d 61 08 72 e0 77 a4 af 78 |. .... ]a.r.w..x|
00000030 36 f3 f9 99 83 58 00 26 0e b3 e0 ce f7 5d e8 9b |6....X.&.....]..|
00000040 b3 e8 92 8b 7f 34 50 |.....4P|
[8f2e 02-22 00:16:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e cf e7 bd eb 08 79 23 dc 93 a8 b4 a4 a7 d0 3a |^.....y#.......:|
00000010 35 e7 be 1d a6 40 f5 3c 2d 57 4d d9 76 1b 67 24 |5....@.<-WM.v.g$|
[8f2f 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 50 90 15 bd 6b 64 6b c6 0d f6 |0E.!..P...kdk...|
00000010 f6 e7 c3 62 8f 29 6a 1f e5 fb 88 d7 70 5f 32 3e |...b.)j.....p_2>|
00000020 a8 e7 e3 8d ed 02 20 64 11 2e 90 3d f6 f2 51 23 |...... d...=..Q#|
00000030 96 f3 b9 06 3a a3 cd bc e9 c3 6d a3 b3 a1 a0 15 |....:.....m.....|
00000040 73 81 e3 c9 16 a0 7a |s.....z|
[8f30 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f31 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f32 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8f33 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8f34 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8f35 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8f36 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8f37 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8f38 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[8f39 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[8f3a 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f3b 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cbb20 gate 1582330602972380300 evaluation starts
[8f3c 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cbb20 signed by 0 principal evaluation starts (used [false])
[8f3d 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cbb20 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8f3e 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cbb20 principal evaluation succeeds for identity 0
[8f3f 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cbb20 gate 1582330602972380300 evaluation succeeds
[8f40 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8f41 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8f42 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8f43 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8f44 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f45 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f46 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8f47 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8f48 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8f49 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8f4a 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8f4b 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8f4c 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 95 69 8f 35 c5 48 e1 2f e6 5b 41 d2 3f 38 ba |$.i.5.H./.[A.?8.|
00000010 d6 f8 0a 74 b0 8e 7e 8b d3 90 16 e4 8a 7f fd 9e |...t..~.........|
[8f4d 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 00 ad bb 02 79 12 da cc 4b 1c |0E.!......y...K.|
00000010 03 b6 fa 5d ab 3a ba 94 44 65 ae 74 57 f7 86 34 |...].:..De.tW..4|
00000020 25 c1 8b 30 6f 02 20 1a 56 f6 2f 40 c1 6c 50 a5 |%..0o. .V./@.lP.|
00000030 ee 4f af 80 4f 07 52 8c 78 2f 8f 8c a3 c9 4c 9f |.O..O.R.x/....L.|
00000040 14 b2 2a c7 40 85 72 |..*.@.r|
[8f4e 02-22 00:16:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f4f 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e9590 gate 1582330602980085800 evaluation starts
[8f50 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e9590 signed by 0 principal evaluation starts (used [false])
[8f51 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e9590 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8f52 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e9590 principal evaluation succeeds for identity 0
[8f53 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e9590 gate 1582330602980085800 evaluation succeeds
[8f54 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8f55 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8f56 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8f57 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8f58 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f59 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8f5a 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8f5b 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8f5c 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8f5d 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8f5e 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 95 69 8f 35 c5 48 e1 2f e6 5b 41 d2 3f 38 ba |$.i.5.H./.[A.?8.|
00000010 d6 f8 0a 74 b0 8e 7e 8b d3 90 16 e4 8a 7f fd 9e |...t..~.........|
[8f5f 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 00 ad bb 02 79 12 da cc 4b 1c |0E.!......y...K.|
00000010 03 b6 fa 5d ab 3a ba 94 44 65 ae 74 57 f7 86 34 |...].:..De.tW..4|
00000020 25 c1 8b 30 6f 02 20 1a 56 f6 2f 40 c1 6c 50 a5 |%..0o. .V./@.lP.|
00000030 ee 4f af 80 4f 07 52 8c 78 2f 8f 8c a3 c9 4c 9f |.O..O.R.x/....L.|
00000040 14 b2 2a c7 40 85 72 |..*.@.r|
[8f60 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f62 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004702320 gate 1582330602984654100 evaluation starts
[8f63 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004702320 signed by 0 principal evaluation starts (used [false])
[8f64 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004702320 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8f65 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004702320 principal evaluation succeeds for identity 0
[8f66 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004702320 gate 1582330602984654100 evaluation succeeds
[8f67 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8f68 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8f69 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8f6a 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8f61 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info
[8f6c 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xf6}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]
[8f6d 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile
[8f6b 02-22 00:16:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8f6e 02-22 00:16:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 841 bytes, Signature: 0 bytes
[8f6f 02-22 00:16:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 841 bytes, Signature: 0 bytes
[8f70 02-22 00:16:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f71 02-22 00:16:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f72 02-22 00:16:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8f73 02-22 00:16:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8f74 02-22 00:16:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8f75 02-22 00:16:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8f76 02-22 00:16:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8f77 02-22 00:16:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8f78 02-22 00:16:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b d7 e7 54 ea 3b 90 06 ac 2d 58 d5 11 c3 af cc |...T.;...-X.....|
00000010 7e b1 8b 6a 9d 8c df 97 75 a6 65 a8 e2 dd c0 65 |~..j....u.e....e|
[8f79 02-22 00:16:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 53 14 6b 7e 2b ea dd 15 1d af f9 |0D. bS.k~+......|
00000010 ff 95 c5 98 15 f2 ae 9c d3 3b 21 67 f0 ee 31 06 |.........;!g..1.|
00000020 05 de 02 a2 02 20 14 b1 4c 36 50 9c 85 a0 f6 47 |..... ..L6P....G|
00000030 62 ce d4 1f 5e 2c 67 c7 c3 e9 ae 65 d3 3f 90 0f |b...^,g....e.?..|
00000040 7e 06 9c 92 cf 11 |~.....|
[8f7a 02-22 00:16:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f7b 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004675c60 gate 1582330603020048000 evaluation starts
[8f7c 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004675c60 signed by 0 principal evaluation starts (used [false])
[8f7d 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004675c60 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[8f7e 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004675c60 principal evaluation succeeds for identity 0
[8f7f 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004675c60 gate 1582330603020048000 evaluation succeeds
[8f80 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8f81 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8f82 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8f83 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8f84 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f85 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8f86 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[8f87 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8f88 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8f89 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8f8a 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8f8b 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8f8c 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 e0 6c b7 30 b1 07 c5 79 64 93 60 14 73 3b 5c |..l.0...yd.`.s;\|
00000010 15 30 83 8b f4 9c 7f 65 75 9e 96 80 c6 ee 84 bc |.0.....eu.......|
[8f8d 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 77 5c c9 35 18 16 d2 7e e6 79 |0E.!..w\.5...~.y|
00000010 d1 fa d5 63 45 56 09 23 bf 35 ac 2a 66 db b0 ad |...cEV.#.5.*f...|
00000020 26 30 27 36 ac 02 20 32 57 4f f1 93 a9 58 99 a6 |&0'6.. 2WO...X..|
00000030 6d 7a e4 a8 70 c0 6b ed 88 80 af 6f e2 e1 2d a7 |mz..p.k....o..-.|
00000040 09 4b a3 10 cb 80 f1 |.K.....|
[8f8e 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8f8f 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471b6d0 gate 1582330603023964000 evaluation starts
[8f90 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471b6d0 signed by 0 principal evaluation starts (used [false])
[8f91 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471b6d0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[8f92 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471b6d0 principal evaluation succeeds for identity 0
[8f93 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471b6d0 gate 1582330603023964000 evaluation succeeds
[8f94 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[8f95 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8f96 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8f97 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8f98 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd e1 b8 22 1f 24 02 ff 8c bb 8b d4 09 f2 44 2b |...".$........D+|
00000010 24 15 ac ae 34 6b 27 ea d9 f1 73 8e 65 38 d2 5e |$...4k'...s.e8.^|
[8f99 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 50 5a 4e 6e 1f cb be ad d1 ca d0 |0D. QPZNn.......|
00000010 3b 61 ba c1 07 11 9e 9d 84 ed 22 8c 48 57 77 03 |;a........".HWw.|
00000020 51 06 73 d5 02 20 5a b2 8c 74 93 0b f7 ae 3e 97 |Q.s.. Z..t....>.|
00000030 e8 c7 70 fa 42 f9 05 c0 03 3b 72 55 05 c6 84 4b |..p.B....;rU...K|
00000040 97 a2 fb 7c 87 2b |...|.+|
[8f9a 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[8f9b 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[8f9c 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[8f9d 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[8f9e 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[8f9f 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8fa0 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[8fa1 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd e1 b8 22 1f 24 02 ff 8c bb 8b d4 09 f2 44 2b |...".$........D+|
00000010 24 15 ac ae 34 6b 27 ea d9 f1 73 8e 65 38 d2 5e |$...4k'...s.e8.^|
[8fa2 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 50 5a 4e 6e 1f cb be ad d1 ca d0 |0D. QPZNn.......|
00000010 3b 61 ba c1 07 11 9e 9d 84 ed 22 8c 48 57 77 03 |;a........".HWw.|
00000020 51 06 73 d5 02 20 5a b2 8c 74 93 0b f7 ae 3e 97 |Q.s.. Z..t....>.|
00000030 e8 c7 70 fa 42 f9 05 c0 03 3b 72 55 05 c6 84 4b |..p.B....;rU...K|
00000040 97 a2 fb 7c 87 2b |...|.+|
[8fa3 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8fa4 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004732a50 gate 1582330603029409000 evaluation starts
[8fa5 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004732a50 signed by 0 principal evaluation starts (used [false])
[8fa6 02-22 00:16:43.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004732a50 processing identity 0 - &{Org1MSP 8be655ba89451b517544b2a241617d188129889401e79f0659d7ccb414b44486}
[8fa7 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004732a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)
[8fa8 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004732a50 principal evaluation fails
[8fa9 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004732a50 gate 1582330603029409000 evaluation fails
[8faa 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers
[8fab 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[8fac 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[8fad 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd e1 b8 22 1f 24 02 ff 8c bb 8b d4 09 f2 44 2b |...".$........D+|
00000010 24 15 ac ae 34 6b 27 ea d9 f1 73 8e 65 38 d2 5e |$...4k'...s.e8.^|
[8fae 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 50 5a 4e 6e 1f cb be ad d1 ca d0 |0D. QPZNn.......|
00000010 3b 61 ba c1 07 11 9e 9d 84 ed 22 8c 48 57 77 03 |;a........".HWw.|
00000020 51 06 73 d5 02 20 5a b2 8c 74 93 0b f7 ae 3e 97 |Q.s.. Z..t....>.|
00000030 e8 c7 70 fa 42 f9 05 c0 03 3b 72 55 05 c6 84 4b |..p.B....;rU...K|
00000040 97 a2 fb 7c 87 2b |...|.+|
[8faf 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330600893922500 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[8fb0 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8fb1 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004733c30 gate 1582330603033658100 evaluation starts
[8fb2 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004733c30 signed by 0 principal evaluation starts (used [false])
[8fb3 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004733c30 processing identity 0 - &{Org1MSP 8be655ba89451b517544b2a241617d188129889401e79f0659d7ccb414b44486}
[8fb4 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004733c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)
[8fb5 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004733c30 principal evaluation fails
[8fb6 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004733c30 gate 1582330603033658100 evaluation fails
[8fb7 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[8fb8 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[8fb9 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[8fba 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd e1 b8 22 1f 24 02 ff 8c bb 8b d4 09 f2 44 2b |...".$........D+|
00000010 24 15 ac ae 34 6b 27 ea d9 f1 73 8e 65 38 d2 5e |$...4k'...s.e8.^|
[8fbb 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 50 5a 4e 6e 1f cb be ad d1 ca d0 |0D. QPZNn.......|
00000010 3b 61 ba c1 07 11 9e 9d 84 ed 22 8c 48 57 77 03 |;a........".HWw.|
00000020 51 06 73 d5 02 20 5a b2 8c 74 93 0b f7 ae 3e 97 |Q.s.. Z..t....>.|
00000030 e8 c7 70 fa 42 f9 05 c0 03 3b 72 55 05 c6 84 4b |..p.B....;rU...K|
00000040 97 a2 fb 7c 87 2b |...|.+|
[8fbc 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[8fbd 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004756550 gate 1582330603037521300 evaluation starts
[8fbe 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004756550 signed by 0 principal evaluation starts (used [false])
[8fbf 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004756550 processing identity 0 - &{Org1MSP 8be655ba89451b517544b2a241617d188129889401e79f0659d7ccb414b44486}
[8fc0 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[8fc1 02-22 00:16:43.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[8fc2 02-22 00:16:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[8fc3 02-22 00:16:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004756550 principal evaluation succeeds for identity 0
[8fc4 02-22 00:16:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004756550 gate 1582330603037521300 evaluation succeeds
[8fc5 02-22 00:16:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[8fc6 02-22 00:16:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[8fc7 02-22 00:16:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[8fc8 02-22 00:16:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[8fc9 02-22 00:16:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 86 a1 03 1c d1 40 6d a0 19 24 e4 a3 41 2c d3 |......@m..$..A,.|
00000010 8f e6 57 69 a5 b7 25 c1 a6 4e e0 21 e2 a8 ce a1 |..Wi..%..N.!....|
[8fca 02-22 00:16:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 2e d8 7b 9a 4d 89 16 36 9d 92 |0E.!....{.M..6..|
00000010 64 70 77 24 4b e6 53 51 16 08 a2 39 6f 77 d8 09 |dpw$K.SQ...9ow..|
00000020 eb a1 d6 13 12 02 20 4d a1 92 af 17 b9 5c d3 26 |...... M.....\.&|
00000030 10 58 fe 8e b4 00 3a 4c c7 bc fc ca 75 cd b4 d9 |.X....:L....u...|
00000040 e0 7a a8 65 f2 3a 66 |.z.e.:f|
[8fcb 02-22 00:16:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8fcc 02-22 00:16:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423143373100 seq_num:1582330600893922500 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347 properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[8fcd 02-22 00:16:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 86 a1 03 1c d1 40 6d a0 19 24 e4 a3 41 2c d3 |......@m..$..A,.|
00000010 8f e6 57 69 a5 b7 25 c1 a6 4e e0 21 e2 a8 ce a1 |..Wi..%..N.!....|
[8fce 02-22 00:16:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 2e d8 7b 9a 4d 89 16 36 9d 92 |0E.!....{.M..6..|
00000010 64 70 77 24 4b e6 53 51 16 08 a2 39 6f 77 d8 09 |dpw$K.SQ...9ow..|
00000020 eb a1 d6 13 12 02 20 4d a1 92 af 17 b9 5c d3 26 |...... M.....\.&|
00000030 10 58 fe 8e b4 00 3a 4c c7 bc fc ca 75 cd b4 d9 |.X....:L....u...|
00000040 e0 7a a8 65 f2 3a 66 |.z.e.:f|
[8fcf 02-22 00:16:43.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8fd0 02-22 00:16:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8fd1 02-22 00:16:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8fd2 02-22 00:16:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[8fd3 02-22 00:16:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8fd4 02-22 00:16:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8fd5 02-22 00:16:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6433605997328908112 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[8fd6 02-22 00:16:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6433605997328908112 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[8fd7 02-22 00:16:43.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8fd8 02-22 00:16:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6433605997328908112 , Msg_type: BLOCK_MSG, digests: [2 3 7 9 1 4 5 6 8], Envelope: 60 bytes, Signature: 0 bytes
[8fd9 02-22 00:16:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6433605997328908112 , Msg_type: BLOCK_MSG, digests: [2 3 7 9 1 4 5 6 8], Envelope: 60 bytes, Signature: 0 bytes
[8fda 02-22 00:16:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6433605997328908112 , Msg_type: BLOCK_MSG, digests: [2 3 7 9 1 4 5 6 8], Envelope: 60 bytes, Signature: 0 bytes
[8fdb 02-22 00:16:43.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8fdc 02-22 00:16:43.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[8fdd 02-22 00:16:43.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[8fde 02-22 00:16:43.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8fdf 02-22 00:16:43.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8fe0 02-22 00:16:43.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8fe1 02-22 00:16:43.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330600841198600 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[8fe2 02-22 00:16:43.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330600841198600 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[8fe3 02-22 00:16:43.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd e1 b8 22 1f 24 02 ff 8c bb 8b d4 09 f2 44 2b |...".$........D+|
00000010 24 15 ac ae 34 6b 27 ea d9 f1 73 8e 65 38 d2 5e |$...4k'...s.e8.^|
[8fe4 02-22 00:16:43.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 50 5a 4e 6e 1f cb be ad d1 ca d0 |0D. QPZNn.......|
00000010 3b 61 ba c1 07 11 9e 9d 84 ed 22 8c 48 57 77 03 |;a........".HWw.|
00000020 51 06 73 d5 02 20 5a b2 8c 74 93 0b f7 ae 3e 97 |Q.s.. Z..t....>.|
00000030 e8 c7 70 fa 42 f9 05 c0 03 3b 72 55 05 c6 84 4b |..p.B....;rU...K|
00000040 97 a2 fb 7c 87 2b |...|.+|
[8fe5 02-22 00:16:43.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8fe6 02-22 00:16:43.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330600841198600 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[8fe7 02-22 00:16:43.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd e1 b8 22 1f 24 02 ff 8c bb 8b d4 09 f2 44 2b |...".$........D+|
00000010 24 15 ac ae 34 6b 27 ea d9 f1 73 8e 65 38 d2 5e |$...4k'...s.e8.^|
[8fe8 02-22 00:16:43.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 50 5a 4e 6e 1f cb be ad d1 ca d0 |0D. QPZNn.......|
00000010 3b 61 ba c1 07 11 9e 9d 84 ed 22 8c 48 57 77 03 |;a........".HWw.|
00000020 51 06 73 d5 02 20 5a b2 8c 74 93 0b f7 ae 3e 97 |Q.s.. Z..t....>.|
00000030 e8 c7 70 fa 42 f9 05 c0 03 3b 72 55 05 c6 84 4b |..p.B....;rU...K|
00000040 97 a2 fb 7c 87 2b |...|.+|
[8fe9 02-22 00:16:43.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8fea 02-22 00:16:43.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8feb 02-22 00:16:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330600841198600 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[8fec 02-22 00:16:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330423716019600 seq_num:1582330600841198600 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[8fed 02-22 00:16:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd e1 b8 22 1f 24 02 ff 8c bb 8b d4 09 f2 44 2b |...".$........D+|
00000010 24 15 ac ae 34 6b 27 ea d9 f1 73 8e 65 38 d2 5e |$...4k'...s.e8.^|
[8fee 02-22 00:16:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 50 5a 4e 6e 1f cb be ad d1 ca d0 |0D. QPZNn.......|
00000010 3b 61 ba c1 07 11 9e 9d 84 ed 22 8c 48 57 77 03 |;a........".HWw.|
00000020 51 06 73 d5 02 20 5a b2 8c 74 93 0b f7 ae 3e 97 |Q.s.. Z..t....>.|
00000030 e8 c7 70 fa 42 f9 05 c0 03 3b 72 55 05 c6 84 4b |..p.B....;rU...K|
00000040 97 a2 fb 7c 87 2b |...|.+|
[8fef 02-22 00:16:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ff0 02-22 00:16:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ff1 02-22 00:16:43.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7127389171150761879 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[8ff2 02-22 00:16:43.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7127389171150761879 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[8ff3 02-22 00:16:43.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:7127389171150761879 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[8ff4 02-22 00:16:43.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 4 6 8 3 5 7 9] to 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[8ff5 02-22 00:16:43.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ff6 02-22 00:16:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[8ff7 02-22 00:16:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[8ff8 02-22 00:16:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ff9 02-22 00:16:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ffa 02-22 00:16:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8ffb 02-22 00:16:43.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[8ffc 02-22 00:16:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330600796293700 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[8ffd 02-22 00:16:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330600796293700 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[8ffe 02-22 00:16:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[8fff 02-22 00:16:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9000 02-22 00:16:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9001 02-22 00:16:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9002 02-22 00:16:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9003 02-22 00:16:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9004 02-22 00:16:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9005 02-22 00:16:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 95 69 8f 35 c5 48 e1 2f e6 5b 41 d2 3f 38 ba |$.i.5.H./.[A.?8.|
00000010 d6 f8 0a 74 b0 8e 7e 8b d3 90 16 e4 8a 7f fd 9e |...t..~.........|
[9006 02-22 00:16:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 00 ad bb 02 79 12 da cc 4b 1c |0E.!......y...K.|
00000010 03 b6 fa 5d ab 3a ba 94 44 65 ae 74 57 f7 86 34 |...].:..De.tW..4|
00000020 25 c1 8b 30 6f 02 20 1a 56 f6 2f 40 c1 6c 50 a5 |%..0o. .V./@.lP.|
00000030 ee 4f af 80 4f 07 52 8c 78 2f 8f 8c a3 c9 4c 9f |.O..O.R.x/....L.|
00000040 14 b2 2a c7 40 85 72 |..*.@.r|
[9007 02-22 00:16:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9008 02-22 00:16:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b6b10 gate 1582330603869865100 evaluation starts
[9009 02-22 00:16:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b6b10 signed by 0 principal evaluation starts (used [false])
[900a 02-22 00:16:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b6b10 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[900b 02-22 00:16:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b6b10 principal evaluation succeeds for identity 0
[900c 02-22 00:16:43.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b6b10 gate 1582330603869865100 evaluation succeeds
[900d 02-22 00:16:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[900e 02-22 00:16:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[900f 02-22 00:16:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9010 02-22 00:16:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9011 02-22 00:16:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9012 02-22 00:16:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9013 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424062158700 seq_num:1582330600796293700 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 71 bytes
[9014 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9015 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9016 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9017 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9018 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9019 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[901a 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[901b 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 95 69 8f 35 c5 48 e1 2f e6 5b 41 d2 3f 38 ba |$.i.5.H./.[A.?8.|
00000010 d6 f8 0a 74 b0 8e 7e 8b d3 90 16 e4 8a 7f fd 9e |...t..~.........|
[901c 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 00 ad bb 02 79 12 da cc 4b 1c |0E.!......y...K.|
00000010 03 b6 fa 5d ab 3a ba 94 44 65 ae 74 57 f7 86 34 |...].:..De.tW..4|
00000020 25 c1 8b 30 6f 02 20 1a 56 f6 2f 40 c1 6c 50 a5 |%..0o. .V./@.lP.|
00000030 ee 4f af 80 4f 07 52 8c 78 2f 8f 8c a3 c9 4c 9f |.O..O.R.x/....L.|
00000040 14 b2 2a c7 40 85 72 |..*.@.r|
[901d 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[901e 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047de780 gate 1582330603895749600 evaluation starts
[901f 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047de780 signed by 0 principal evaluation starts (used [false])
[9020 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047de780 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[9021 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047de780 principal evaluation succeeds for identity 0
[9022 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047de780 gate 1582330603895749600 evaluation succeeds
[9023 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9024 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9025 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9026 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9027 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9028 02-22 00:16:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9029 02-22 00:16:44.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[902a 02-22 00:16:44.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[902b 02-22 00:16:44.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[902c 02-22 00:16:44.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[902d 02-22 00:16:44.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[902e 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1582330424343087800 seq_num:1582330600898541000 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7 properties:ledger_height:10 chaincodes:<name:"exp02" version:"1" > chaincodes:<name:"_lifecycle" version:"1" > , Envelope: 127 bytes, Signature: 70 bytes
[902f 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9030 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9031 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9032 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9033 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9034 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9035 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9036 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 15 38 8b 9a e7 29 80 9d f9 29 1a e9 47 dc ad |..8...)...)..G..|
00000010 62 d0 bd 0a 18 0b a3 34 46 19 36 66 3f 70 be a6 |b......4F.6f?p..|
[9037 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 4a 79 9c 97 e2 27 1a 3e 2a 57 1e |0D. [Jy...'.>*W.|
00000010 35 09 ab 03 01 02 1d da 08 bf 41 10 a4 3e a3 51 |5.........A..>.Q|
00000020 a1 e0 eb 6f 02 20 12 84 80 d4 00 41 62 ac 00 e9 |...o. .....Ab...|
00000030 b3 36 5b 47 66 68 62 f3 81 f6 26 3c 19 a8 46 65 |.6[Gfhb...&<..Fe|
00000040 59 5a 7c 7e 54 23 |YZ|~T#|
[9038 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9039 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004808600 gate 1582330604157683100 evaluation starts
[903a 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004808600 signed by 0 principal evaluation starts (used [false])
[903b 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004808600 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[903c 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004808600 principal evaluation succeeds for identity 0
[903d 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004808600 gate 1582330604157683100 evaluation succeeds
[903e 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[903f 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9040 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9041 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9042 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9043 02-22 00:16:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9044 02-22 00:16:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:106 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[9045 02-22 00:16:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:106 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[9046 02-22 00:16:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9047 02-22 00:16:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:106 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[9048 02-22 00:16:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[9049 02-22 00:16:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 c1 72 ab d4 8a c0 5a 9b d3 f2 d9 f7 77 2b 8a |F.r....Z.....w+.|
00000010 ca 22 18 3f 6f 8a 49 5e aa 90 8a bb 0a 2c 45 05 |.".?o.I^.....,E.|
[904a 02-22 00:16:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce c3 a3 8b c5 ca e1 a1 47 32 a4 |0E.!.........G2.|
00000010 c0 d5 bc d9 f4 b5 4b 3d b6 d2 af 87 c8 ad ca 71 |......K=.......q|
00000020 6e 71 61 f7 dd 02 20 66 82 4c c3 8c 48 e3 d8 03 |nqa... f.L..H...|
00000030 9c ca b3 52 6f 20 52 f2 4d aa 0d 2c 19 df 28 d7 |...Ro R.M..,..(.|
00000040 68 21 36 e9 34 52 42 |h!6.4RB|
[904b 02-22 00:16:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[904c 02-22 00:16:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 18 57 1d 4d 42 02 10 c3 11 e5 59 |0D. ..W.MB.....Y|
00000010 1a 3c ae 13 5e 0a 65 d9 ac 2e 8f 24 f8 36 16 8c |.<..^.e....$.6..|
00000020 d6 04 e9 6b 02 20 21 54 30 9f f1 aa 34 1d 84 a4 |...k. !T0...4...|
00000030 6a 1f 27 de 35 e9 6e c8 57 c8 61 88 ab 09 99 78 |j.'.5.n.W.a....x|
00000040 dd 56 7d 85 f4 90 |.V}...|
[904d 02-22 00:16:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:106 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[904e 02-22 00:16:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:106 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[904f 02-22 00:16:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:106
[9050 02-22 00:16:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:106
[9051 02-22 00:16:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[9052 02-22 00:16:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9053 02-22 00:16:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9054 02-22 00:16:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9055 02-22 00:16:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9056 02-22 00:16:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9057 02-22 00:16:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9058 02-22 00:16:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:106 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[9059 02-22 00:16:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[905a 02-22 00:16:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:106 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[905b 02-22 00:16:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:106 , Envelope: 83 bytes, Signature: 71 bytes
[905c 02-22 00:16:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[905d 02-22 00:16:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:106 , Envelope: 83 bytes, Signature: 71 bytes
[905e 02-22 00:16:44.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[905f 02-22 00:16:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:106 , Envelope: 83 bytes, Signature: 71 bytes
[9060 02-22 00:16:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:106 , Envelope: 83 bytes, Signature: 71 bytes
[9061 02-22 00:16:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9062 02-22 00:16:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:106 , Envelope: 83 bytes, Signature: 71 bytes
[9063 02-22 00:16:44.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9064 02-22 00:16:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:106 , Envelope: 83 bytes, Signature: 71 bytes
[9065 02-22 00:16:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9066 02-22 00:16:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:106 , Envelope: 83 bytes, Signature: 71 bytes
[9067 02-22 00:16:44.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9068 02-22 00:16:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes
[9069 02-22 00:16:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[906a 02-22 00:16:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes
[906b 02-22 00:16:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[906c 02-22 00:16:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[906d 02-22 00:16:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[906e 02-22 00:16:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[906f 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9070 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9071 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9072 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9073 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4c 6b 81 0f bf 5e 05 32 e2 84 76 64 4f 46 05 67 |Lk...^.2..vdOF.g|
00000010 b1 50 00 8d c0 8c 81 ee cd 0d e1 f3 9a 7b 5c 35 |.P...........{\5|
[9074 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 78 e0 40 98 85 4f a0 e7 8c a0 |0E.!..x.@..O....|
00000010 c4 18 a3 e5 01 66 4a 36 d0 d9 14 94 74 6b 59 47 |.....fJ6....tkYG|
00000020 48 86 28 29 28 02 20 53 f8 ca 01 df de 63 93 2e |H.()(. S.....c..|
00000030 6f 05 a1 86 7f 6d d3 ec c3 85 d2 e1 1f e7 69 9d |o....m........i.|
00000040 3f 08 16 ca a9 37 00 |?....7.|
[9075 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes
[9076 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes
[9077 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes
[9078 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9079 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004844cb0 gate 1582330604255906200 evaluation starts
[907a 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004844cb0 signed by 0 principal evaluation starts (used [false])
[907b 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004844cb0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[907c 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004844cb0 principal evaluation succeeds for identity 0
[907d 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004844cb0 gate 1582330604255906200 evaluation succeeds
[907e 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[907f 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9080 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9081 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9082 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes
[9083 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes]}
[9084 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:105
[9085 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:105
[9086 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:104 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[9087 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9088 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9089 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[908a 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes
[908b 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[908d 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes
[908c 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[908e 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes
[908f 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9090 02-22 00:16:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9091 02-22 00:16:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9092 02-22 00:16:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9093 02-22 00:16:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9094 02-22 00:16:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9095 02-22 00:16:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9096 02-22 00:16:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9097 02-22 00:16:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9098 02-22 00:16:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[9099 02-22 00:16:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[909a 02-22 00:16:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes
[909b 02-22 00:16:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[909c 02-22 00:16:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[909d 02-22 00:16:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes
[909e 02-22 00:16:44.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[909f 02-22 00:16:44.28 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[90a0 02-22 00:16:44.28 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[90a1 02-22 00:16:44.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510251801
[90a2 02-22 00:16:44.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CC5E07DC4C5E26E17760601DEE91B1FF32905A14DFA46F6813A0B3D98D7792B9
[90a3 02-22 00:16:44.28 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[90a4 02-22 00:16:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90a5 02-22 00:16:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90a6 02-22 00:16:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90a7 02-22 00:16:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90a8 02-22 00:16:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:37 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers
[90a9 02-22 00:16:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90aa 02-22 00:16:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90ab 02-22 00:16:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:37 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes
[90ac 02-22 00:16:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90ad 02-22 00:16:44.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151064
[90ae 02-22 00:16:44.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 03F2EAA91AD64650B0B1DB3DC99E43DD7FEF8829C9C51A62A3E12B2806A4722A
[90af 02-22 00:16:44.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[90b0 02-22 00:16:44.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[90b1 02-22 00:16:44.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[90b2 02-22 00:16:44.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90b3 02-22 00:16:44.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90b4 02-22 00:16:44.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90b5 02-22 00:16:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[90b6 02-22 00:16:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[90b7 02-22 00:16:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes
[90b8 02-22 00:16:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90b9 02-22 00:16:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[90ba 02-22 00:16:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90bb 02-22 00:16:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90bc 02-22 00:16:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[90bd 02-22 00:16:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes
[90be 02-22 00:16:44.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90bf 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes
[90c0 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes
[90c1 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90c2 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes
[90c3 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[90c4 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90c5 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[90c6 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[90c7 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[90c8 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[90c9 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[90ca 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[90cb 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a 60 01 26 da 91 20 4f 7b 4e 0c fa 5b 4d 43 21 |.`.&.. O{N..[MC!|
00000010 d2 f8 63 f5 7e 4f 55 c1 83 08 e0 e5 5f 79 b4 69 |..c.~OU....._y.i|
[90cc 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 46 a4 0e 92 1b ff 7a df 1b 57 |0E.!..F.....z..W|
00000010 9f 2f c2 76 a3 ba 37 0d 04 c7 ca d7 e1 84 ad 15 |./.v..7.........|
00000020 7c 92 be 72 a9 02 20 56 7d 33 f6 62 2c a6 5f 52 ||..r.. V}3.b,._R|
00000030 8d d1 1d 06 76 fa fa f3 85 bd 9c dc 23 36 7a 35 |....v.......#6z5|
00000040 7d d5 46 95 ae cd 69 |}.F...i|
[90cd 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[90ce 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048962b0 gate 1582330605136699500 evaluation starts
[90cf 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048962b0 signed by 0 principal evaluation starts (used [false])
[90d0 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048962b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[90d1 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048962b0 principal evaluation succeeds for identity 0
[90d2 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048962b0 gate 1582330605136699500 evaluation succeeds
[90d3 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[90d4 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[90d5 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[90d6 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[90d7 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes
[90d8 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes]}
[90d9 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:101
[90da 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:101
[90db 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:100 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[90dc 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90dd 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90de 02-22 00:16:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90df 02-22 00:16:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90e0 02-22 00:16:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90e1 02-22 00:16:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90e2 02-22 00:16:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90e3 02-22 00:16:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90e4 02-22 00:16:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90e5 02-22 00:16:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[90e6 02-22 00:16:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90e7 02-22 00:16:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90e8 02-22 00:16:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[90e9 02-22 00:16:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes
[90ea 02-22 00:16:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90eb 02-22 00:16:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes
[90ec 02-22 00:16:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90ed 02-22 00:16:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes
[90ee 02-22 00:16:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes
[90ef 02-22 00:16:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90f0 02-22 00:16:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes
[90f1 02-22 00:16:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90f2 02-22 00:16:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:2770801228355097677 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[90f3 02-22 00:16:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:2770801228355097677 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[90f4 02-22 00:16:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:2770801228355097677 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[90f5 02-22 00:16:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90f6 02-22 00:16:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90f7 02-22 00:16:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90f8 02-22 00:16:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90f9 02-22 00:16:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90fa 02-22 00:16:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[90fb 02-22 00:16:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8] to 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[90fc 02-22 00:16:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[90fd 02-22 00:16:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:107 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[90fe 02-22 00:16:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:107 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[90ff 02-22 00:16:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9100 02-22 00:16:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:107 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes
[9101 02-22 00:16:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[9102 02-22 00:16:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae e4 39 48 72 c3 c7 e8 67 18 40 9c 2c 40 24 98 |..9Hr...g.@.,@$.|
00000010 14 8c 20 c7 3a 17 23 ea 40 8d bf 0a 12 de a6 44 |.. .:.#.@......D|
[9103 02-22 00:16:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 28 29 24 0a f2 8d ba c9 50 13 |0E.!..()$.....P.|
00000010 72 50 8e 02 70 49 76 c3 24 99 d9 dc c5 2c 31 a9 |rP..pIv.$....,1.|
00000020 29 3d ba e2 18 02 20 6b d2 7b 8a c3 c1 f9 77 ec |)=.... k.{....w.|
00000030 b0 29 86 65 1a c7 1c 56 dd dc ef ca 8c 17 cf ad |.).e...V........|
00000040 5d 53 db ae 90 76 1d |]S...v.|
[9104 02-22 00:16:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[9105 02-22 00:16:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 f6 e0 fb ef 3d d0 07 41 0f 51 |0E.!......=..A.Q|
00000010 f4 d2 a3 9a 05 59 fd 9f d7 b3 42 c3 11 87 e7 95 |.....Y....B.....|
00000020 ec 47 a0 da cd 02 20 6c 9b 69 8f 0a b6 72 2d 55 |.G.... l.i...r-U|
00000030 20 57 bd 23 72 15 67 54 ad ec 1b 43 7f 10 ac ed | W.#r.gT...C....|
00000040 18 9b 00 b6 08 fd 89 |.......|
[9106 02-22 00:16:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:107 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[9107 02-22 00:16:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:107 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[9108 02-22 00:16:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:107
[9109 02-22 00:16:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:107
[910a 02-22 00:16:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:106 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership
[910b 02-22 00:16:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[910c 02-22 00:16:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[910d 02-22 00:16:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[910e 02-22 00:16:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[910f 02-22 00:16:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9110 02-22 00:16:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9111 02-22 00:16:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers
[9112 02-22 00:16:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[9113 02-22 00:16:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[9114 02-22 00:16:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9115 02-22 00:16:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:5392333763798754542 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[9116 02-22 00:16:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:5392333763798754542 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[9117 02-22 00:16:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:5392333763798754542 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[9118 02-22 00:16:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9] to 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[9119 02-22 00:16:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[911a 02-22 00:16:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:13999270783712602365 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[911b 02-22 00:16:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:13999270783712602365 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[911c 02-22 00:16:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[911d 02-22 00:16:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[911e 02-22 00:16:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[911f 02-22 00:16:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9120 02-22 00:16:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9121 02-22 00:16:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9122 02-22 00:16:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09] to 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[9123 02-22 00:16:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9124 02-22 00:16:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[9125 02-22 00:16:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:11702692698139945511 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes to 1 peers
[9126 02-22 00:16:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[9127 02-22 00:16:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2061684110735353386 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[9128 02-22 00:16:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[9129 02-22 00:16:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:2111492479459277051 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[912a 02-22 00:16:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:11702692698139945511 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[912b 02-22 00:16:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2111492479459277051 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[912d 02-22 00:16:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[912c 02-22 00:16:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:2061684110735353386 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[912e 02-22 00:16:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[912f 02-22 00:16:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9130 02-22 00:16:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2111492479459277051 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[9131 02-22 00:16:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2111492479459277051 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[9132 02-22 00:16:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2111492479459277051 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[9133 02-22 00:16:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9134 02-22 00:16:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2061684110735353386 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[9135 02-22 00:16:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2061684110735353386 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[9136 02-22 00:16:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2061684110735353386 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[9137 02-22 00:16:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9138 02-22 00:16:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11702692698139945511 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[9139 02-22 00:16:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11702692698139945511 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 154 bytes, Signature: 0 bytes
[913a 02-22 00:16:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[913b 02-22 00:16:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:106 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[913c 02-22 00:16:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[913d 02-22 00:16:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:106 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[913e 02-22 00:16:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[913f 02-22 00:16:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9140 02-22 00:16:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9141 02-22 00:16:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9142 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9143 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9144 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9145 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9146 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 11 4d 3a d3 46 50 8a a6 02 41 e3 ed 25 ba 28 |..M:.FP...A..%.(|
00000010 88 bf 56 d3 c2 8d 27 d3 c6 7e 23 fc 0b ec ea fe |..V...'..~#.....|
[9147 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 18 68 dc ba 3a 11 aa 28 f6 45 8f |0D. l.h..:..(.E.|
00000010 a2 b5 0a c0 58 a2 df e5 f6 e5 ac 26 03 65 d8 ac |....X......&.e..|
00000020 8c 08 be 13 02 20 08 c5 1e 4a da 50 d2 5b b3 be |..... ...J.P.[..|
00000030 b0 ec c8 a2 56 ed fb 8a 04 85 4a fa 32 25 36 a7 |....V.....J.2%6.|
00000040 2d bf b4 73 8e cb |-..s..|
[9148 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9149 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910bd0 gate 1582330606501651600 evaluation starts
[914a 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910bd0 signed by 0 principal evaluation starts (used [false])
[914b 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910bd0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[914c 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910bd0 principal evaluation succeeds for identity 0
[914d 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004910bd0 gate 1582330606501651600 evaluation succeeds
[914e 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[914f 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9150 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9151 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9152 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:106 , Envelope: 83 bytes, Signature: 70 bytes
[9153 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:106 , Envelope: 83 bytes, Signature: 70 bytes]}
[9154 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:106
[9155 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:106
[9156 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:105 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[9157 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9158 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9159 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[915a 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[915b 02-22 00:16:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[915c 02-22 00:16:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[915d 02-22 00:16:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[915e 02-22 00:16:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[915f 02-22 00:16:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[9160 02-22 00:16:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[9161 02-22 00:16:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9162 02-22 00:16:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151065
[9163 02-22 00:16:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 639FF8C470DC383422BF272023BCBE45F441B6068D669B43473B2A7812845805
[9164 02-22 00:16:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[9165 02-22 00:16:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[9166 02-22 00:16:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9167 02-22 00:16:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[9168 02-22 00:16:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[9169 02-22 00:16:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[916a 02-22 00:16:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers
[916b 02-22 00:16:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[916c 02-22 00:16:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[916d 02-22 00:16:46.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes
[916e 02-22 00:16:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[916f 02-22 00:16:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[9170 02-22 00:16:46.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9171 02-22 00:16:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[9172 02-22 00:16:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[9173 02-22 00:16:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9174 02-22 00:16:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes
[9175 02-22 00:16:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[9176 02-22 00:16:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 9f f8 c4 70 dc 38 34 22 bf 27 20 23 bc be 45 |c...p.84".' #..E|
00000010 f4 41 b6 06 8d 66 9b 43 47 3b 2a 78 12 84 58 05 |.A...f.CG;*x..X.|
[9177 02-22 00:16:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c8 bd 94 ab f3 dc dd 7e 58 17 86 |0E.!........~X..|
00000010 37 9f 33 33 28 0b 48 15 db e7 58 d0 99 b4 46 f2 |7.33(.H...X...F.|
00000020 64 a2 d1 ee 6e 02 20 54 49 ce e7 25 51 ec 62 55 |d...n. TI..%Q.bU|
00000030 89 1a cc fb 31 7a 95 0c 45 6c 40 d3 74 b4 d8 a0 |....1z..El@.t...|
00000040 e1 19 20 46 30 d7 20 |.. F0. |
[9178 02-22 00:16:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[9179 02-22 00:16:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 8c 5f 20 92 05 ec a1 26 4c 0f 3d |0D. (._ ....&L.=|
00000010 9f d1 4c f3 b9 07 4b 36 33 57 5c 57 d7 bc 0d ec |..L...K63W\W....|
00000020 56 78 05 91 02 20 5b e3 98 b4 2f 10 28 3c 8c 90 |Vx... [.../.(<..|
00000030 bf 7a be be 56 77 98 ae 25 ee 8f 3a 2a 89 54 f8 |.z..Vw..%..:*.T.|
00000040 45 80 96 b9 98 0e |E.....|
[917a 02-22 00:16:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[917b 02-22 00:16:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[917c 02-22 00:16:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[917d 02-22 00:16:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[917e 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[917f 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[9180 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9181 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes
[9182 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[9183 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 9f f8 c4 70 dc 38 34 22 bf 27 20 23 bc be 45 |c...p.84".' #..E|
00000010 f4 41 b6 06 8d 66 9b 43 47 3b 2a 78 12 84 58 05 |.A...f.CG;*x..X.|
[9184 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c8 bd 94 ab f3 dc dd 7e 58 17 86 |0E.!........~X..|
00000010 37 9f 33 33 28 0b 48 15 db e7 58 d0 99 b4 46 f2 |7.33(.H...X...F.|
00000020 64 a2 d1 ee 6e 02 20 54 49 ce e7 25 51 ec 62 55 |d...n. TI..%Q.bU|
00000030 89 1a cc fb 31 7a 95 0c 45 6c 40 d3 74 b4 d8 a0 |....1z..El@.t...|
00000040 e1 19 20 46 30 d7 20 |.. F0. |
[9185 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes
[9186 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes
[9187 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9188 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[9189 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae e4 39 48 72 c3 c7 e8 67 18 40 9c 2c 40 24 98 |..9Hr...g.@.,@$.|
00000010 14 8c 20 c7 3a 17 23 ea 40 8d bf 0a 12 de a6 44 |.. .:.#.@......D|
[918a 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 28 29 24 0a f2 8d ba c9 50 13 |0E.!..()$.....P.|
00000010 72 50 8e 02 70 49 76 c3 24 99 d9 dc c5 2c 31 a9 |rP..pIv.$....,1.|
00000020 29 3d ba e2 18 02 20 6b d2 7b 8a c3 c1 f9 77 ec |)=.... k.{....w.|
00000030 b0 29 86 65 1a c7 1c 56 dd dc ef ca 8c 17 cf ad |.).e...V........|
00000040 5d 53 db ae 90 76 1d |]S...v.|
[918b 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:107 , Envelope: 83 bytes, Signature: 71 bytes
[918c 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[918d 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[918e 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[918f 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9190 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9191 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9192 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9193 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9194 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9195 02-22 00:16:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 11 4d 3a d3 46 50 8a a6 02 41 e3 ed 25 ba 28 |..M:.FP...A..%.(|
00000010 88 bf 56 d3 c2 8d 27 d3 c6 7e 23 fc 0b ec ea fe |..V...'..~#.....|
[9196 02-22 00:16:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 18 68 dc ba 3a 11 aa 28 f6 45 8f |0D. l.h..:..(.E.|
00000010 a2 b5 0a c0 58 a2 df e5 f6 e5 ac 26 03 65 d8 ac |....X......&.e..|
00000020 8c 08 be 13 02 20 08 c5 1e 4a da 50 d2 5b b3 be |..... ...J.P.[..|
00000030 b0 ec c8 a2 56 ed fb 8a 04 85 4a fa 32 25 36 a7 |....V.....J.2%6.|
00000040 2d bf b4 73 8e cb |-..s..|
[9197 02-22 00:16:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9198 02-22 00:16:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496a010 gate 1582330606582500300 evaluation starts
[9199 02-22 00:16:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496a010 signed by 0 principal evaluation starts (used [false])
[919a 02-22 00:16:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496a010 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[919b 02-22 00:16:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496a010 principal evaluation succeeds for identity 0
[919c 02-22 00:16:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496a010 gate 1582330606582500300 evaluation succeeds
[919d 02-22 00:16:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[919e 02-22 00:16:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[919f 02-22 00:16:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[91a0 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[91a1 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[91a2 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:106 , Envelope: 83 bytes, Signature: 70 bytes
[91a3 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[91a4 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[91a5 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes
[91a7 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[91a8 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 9f f8 c4 70 dc 38 34 22 bf 27 20 23 bc be 45 |c...p.84".' #..E|
00000010 f4 41 b6 06 8d 66 9b 43 47 3b 2a 78 12 84 58 05 |.A...f.CG;*x..X.|
[91a9 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c8 bd 94 ab f3 dc dd 7e 58 17 86 |0E.!........~X..|
00000010 37 9f 33 33 28 0b 48 15 db e7 58 d0 99 b4 46 f2 |7.33(.H...X...F.|
00000020 64 a2 d1 ee 6e 02 20 54 49 ce e7 25 51 ec 62 55 |d...n. TI..%Q.bU|
00000030 89 1a cc fb 31 7a 95 0c 45 6c 40 d3 74 b4 d8 a0 |....1z..El@.t...|
00000040 e1 19 20 46 30 d7 20 |.. F0. |
[91aa 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes
[91a6 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[91ab 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes
[91ac 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[91ad 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[91ae 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae e4 39 48 72 c3 c7 e8 67 18 40 9c 2c 40 24 98 |..9Hr...g.@.,@$.|
00000010 14 8c 20 c7 3a 17 23 ea 40 8d bf 0a 12 de a6 44 |.. .:.#.@......D|
[91af 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 28 29 24 0a f2 8d ba c9 50 13 |0E.!..()$.....P.|
00000010 72 50 8e 02 70 49 76 c3 24 99 d9 dc c5 2c 31 a9 |rP..pIv.$....,1.|
00000020 29 3d ba e2 18 02 20 6b d2 7b 8a c3 c1 f9 77 ec |)=.... k.{....w.|
00000030 b0 29 86 65 1a c7 1c 56 dd dc ef ca 8c 17 cf ad |.).e...V........|
00000040 5d 53 db ae 90 76 1d |]S...v.|
[91b0 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:107 , Envelope: 83 bytes, Signature: 71 bytes
[91b1 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[91b2 02-22 00:16:46.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[91b3 02-22 00:16:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:102 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[91b4 02-22 00:16:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:102 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[91b5 02-22 00:16:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[91b6 02-22 00:16:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:102 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[91b7 02-22 00:16:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[91b8 02-22 00:16:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[91b9 02-22 00:16:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[91ba 02-22 00:16:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[91bb 02-22 00:16:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[91bc 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[91bd 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[91be 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[91bf 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 1f b7 74 57 b8 26 f1 9d 5a 14 13 44 b4 4e 5f |...tW.&..Z..D.N_|
00000010 00 7b d3 ec cf 22 26 60 ca ce 7f 47 00 11 3a 0c |.{..."&`...G..:.|
[91c0 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae d2 18 f4 33 70 ea f1 7f 90 24 |0E.!.....3p....$|
00000010 54 62 62 5e a3 34 af f4 50 1b b6 59 ae a3 37 bc |Tbb^.4..P..Y..7.|
00000020 ae 85 bf fa ba 02 20 58 9f 86 eb 52 f0 d7 ee 7d |...... X...R...}|
00000030 06 54 a3 1f 46 09 96 b6 c2 50 c5 0d be 99 aa 2c |.T..F....P.....,|
00000040 45 c6 ef 28 2e 5e fb |E..(.^.|
[91c1 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[91c2 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049873b0 gate 1582330606640539200 evaluation starts
[91c3 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049873b0 signed by 0 principal evaluation starts (used [false])
[91c4 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049873b0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[91c5 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049873b0 principal evaluation succeeds for identity 0
[91c6 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049873b0 gate 1582330606640539200 evaluation succeeds
[91c7 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[91c8 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[91c9 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[91ca 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[91cb 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:102 , Envelope: 83 bytes, Signature: 71 bytes
[91cc 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:102 , Envelope: 83 bytes, Signature: 71 bytes]}
[91cd 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:102
[91ce 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:102
[91cf 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:101 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[91d0 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[91d1 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[91d2 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[91d3 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[91d4 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[91d5 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[91d6 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[91d7 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[91d8 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[91d9 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[91da 02-22 00:16:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[91db 02-22 00:16:46.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[91dc 02-22 00:16:46.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[91dd 02-22 00:16:46.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[91de 02-22 00:16:46.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[91df 02-22 00:16:46.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[91e0 02-22 00:16:46.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[91e1 02-22 00:16:46.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[91e2 02-22 00:16:46.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 841 bytes, Signature: 0 bytes
[91e3 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 841 bytes, Signature: 0 bytes
[91e4 02-22 00:16:46.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[91e5 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd e1 b8 22 1f 24 02 ff 8c bb 8b d4 09 f2 44 2b |...".$........D+|
00000010 24 15 ac ae 34 6b 27 ea d9 f1 73 8e 65 38 d2 5e |$...4k'...s.e8.^|
[91e6 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 50 5a 4e 6e 1f cb be ad d1 ca d0 |0D. QPZNn.......|
00000010 3b 61 ba c1 07 11 9e 9d 84 ed 22 8c 48 57 77 03 |;a........".HWw.|
00000020 51 06 73 d5 02 20 5a b2 8c 74 93 0b f7 ae 3e 97 |Q.s.. Z..t....>.|
00000030 e8 c7 70 fa 42 f9 05 c0 03 3b 72 55 05 c6 84 4b |..p.B....;rU...K|
00000040 97 a2 fb 7c 87 2b |...|.+|
[91e7 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[91e8 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 86 a1 03 1c d1 40 6d a0 19 24 e4 a3 41 2c d3 |......@m..$..A,.|
00000010 8f e6 57 69 a5 b7 25 c1 a6 4e e0 21 e2 a8 ce a1 |..Wi..%..N.!....|
[91e9 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 2e d8 7b 9a 4d 89 16 36 9d 92 |0E.!....{.M..6..|
00000010 64 70 77 24 4b e6 53 51 16 08 a2 39 6f 77 d8 09 |dpw$K.SQ...9ow..|
00000020 eb a1 d6 13 12 02 20 4d a1 92 af 17 b9 5c d3 26 |...... M.....\.&|
00000030 10 58 fe 8e b4 00 3a 4c c7 bc fc ca 75 cd b4 d9 |.X....:L....u...|
00000040 e0 7a a8 65 f2 3a 66 |.z.e.:f|
[91ea 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[91eb 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[91ec 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[91ed 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[91ee 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[91ef 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[91f0 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[91f1 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[91f2 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 15 38 8b 9a e7 29 80 9d f9 29 1a e9 47 dc ad |..8...)...)..G..|
00000010 62 d0 bd 0a 18 0b a3 34 46 19 36 66 3f 70 be a6 |b......4F.6f?p..|
[91f3 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 4a 79 9c 97 e2 27 1a 3e 2a 57 1e |0D. [Jy...'.>*W.|
00000010 35 09 ab 03 01 02 1d da 08 bf 41 10 a4 3e a3 51 |5.........A..>.Q|
00000020 a1 e0 eb 6f 02 20 12 84 80 d4 00 41 62 ac 00 e9 |...o. .....Ab...|
00000030 b3 36 5b 47 66 68 62 f3 81 f6 26 3c 19 a8 46 65 |.6[Gfhb...&<..Fe|
00000040 59 5a 7c 7e 54 23 |YZ|~T#|
[91f4 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[91f5 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049bc920 gate 1582330606944237200 evaluation starts
[91f6 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049bc920 signed by 0 principal evaluation starts (used [false])
[91f7 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049bc920 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[91f8 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049bc920 principal evaluation succeeds for identity 0
[91f9 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049bc920 gate 1582330606944237200 evaluation succeeds
[91fa 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[91fb 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[91fc 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[91fd 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[91fe 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[91ff 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9200 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9201 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9202 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9203 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9204 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9205 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9206 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 95 69 8f 35 c5 48 e1 2f e6 5b 41 d2 3f 38 ba |$.i.5.H./.[A.?8.|
00000010 d6 f8 0a 74 b0 8e 7e 8b d3 90 16 e4 8a 7f fd 9e |...t..~.........|
[9207 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 00 ad bb 02 79 12 da cc 4b 1c |0E.!......y...K.|
00000010 03 b6 fa 5d ab 3a ba 94 44 65 ae 74 57 f7 86 34 |...].:..De.tW..4|
00000020 25 c1 8b 30 6f 02 20 1a 56 f6 2f 40 c1 6c 50 a5 |%..0o. .V./@.lP.|
00000030 ee 4f af 80 4f 07 52 8c 78 2f 8f 8c a3 c9 4c 9f |.O..O.R.x/....L.|
00000040 14 b2 2a c7 40 85 72 |..*.@.r|
[9208 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9209 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049da390 gate 1582330606946475200 evaluation starts
[920a 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049da390 signed by 0 principal evaluation starts (used [false])
[920b 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049da390 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[920c 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049da390 principal evaluation succeeds for identity 0
[920d 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049da390 gate 1582330606946475200 evaluation succeeds
[920e 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[920f 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9210 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9211 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9212 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 841 bytes, Signature: 0 bytes
[9213 02-22 00:16:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9214 02-22 00:16:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 841 bytes, Signature: 0 bytes
[9215 02-22 00:16:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9216 02-22 00:16:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9217 02-22 00:16:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9218 02-22 00:16:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9219 02-22 00:16:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[921a 02-22 00:16:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[921b 02-22 00:16:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[921c 02-22 00:16:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[921d 02-22 00:16:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[921e 02-22 00:16:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 95 69 8f 35 c5 48 e1 2f e6 5b 41 d2 3f 38 ba |$.i.5.H./.[A.?8.|
00000010 d6 f8 0a 74 b0 8e 7e 8b d3 90 16 e4 8a 7f fd 9e |...t..~.........|
[921f 02-22 00:16:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 00 ad bb 02 79 12 da cc 4b 1c |0E.!......y...K.|
00000010 03 b6 fa 5d ab 3a ba 94 44 65 ae 74 57 f7 86 34 |...].:..De.tW..4|
00000020 25 c1 8b 30 6f 02 20 1a 56 f6 2f 40 c1 6c 50 a5 |%..0o. .V./@.lP.|
00000030 ee 4f af 80 4f 07 52 8c 78 2f 8f 8c a3 c9 4c 9f |.O..O.R.x/....L.|
00000040 14 b2 2a c7 40 85 72 |..*.@.r|
[9220 02-22 00:16:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9221 02-22 00:16:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ea320 gate 1582330606968515800 evaluation starts
[9222 02-22 00:16:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ea320 signed by 0 principal evaluation starts (used [false])
[9223 02-22 00:16:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ea320 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[9224 02-22 00:16:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ea320 principal evaluation succeeds for identity 0
[9225 02-22 00:16:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ea320 gate 1582330606968515800 evaluation succeeds
[9226 02-22 00:16:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9227 02-22 00:16:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9228 02-22 00:16:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9229 02-22 00:16:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[922a 02-22 00:16:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 86 a1 03 1c d1 40 6d a0 19 24 e4 a3 41 2c d3 |......@m..$..A,.|
00000010 8f e6 57 69 a5 b7 25 c1 a6 4e e0 21 e2 a8 ce a1 |..Wi..%..N.!....|
[922b 02-22 00:16:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 2e d8 7b 9a 4d 89 16 36 9d 92 |0E.!....{.M..6..|
00000010 64 70 77 24 4b e6 53 51 16 08 a2 39 6f 77 d8 09 |dpw$K.SQ...9ow..|
00000020 eb a1 d6 13 12 02 20 4d a1 92 af 17 b9 5c d3 26 |...... M.....\.&|
00000030 10 58 fe 8e b4 00 3a 4c c7 bc fc ca 75 cd b4 d9 |.X....:L....u...|
00000040 e0 7a a8 65 f2 3a 66 |.z.e.:f|
[922c 02-22 00:16:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd e1 b8 22 1f 24 02 ff 8c bb 8b d4 09 f2 44 2b |...".$........D+|
00000010 24 15 ac ae 34 6b 27 ea d9 f1 73 8e 65 38 d2 5e |$...4k'...s.e8.^|
[922d 02-22 00:16:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 50 5a 4e 6e 1f cb be ad d1 ca d0 |0D. QPZNn.......|
00000010 3b 61 ba c1 07 11 9e 9d 84 ed 22 8c 48 57 77 03 |;a........".HWw.|
00000020 51 06 73 d5 02 20 5a b2 8c 74 93 0b f7 ae 3e 97 |Q.s.. Z..t....>.|
00000030 e8 c7 70 fa 42 f9 05 c0 03 3b 72 55 05 c6 84 4b |..p.B....;rU...K|
00000040 97 a2 fb 7c 87 2b |...|.+|
[922e 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[922f 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9230 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9231 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9232 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9233 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9234 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9235 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9236 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 15 38 8b 9a e7 29 80 9d f9 29 1a e9 47 dc ad |..8...)...)..G..|
00000010 62 d0 bd 0a 18 0b a3 34 46 19 36 66 3f 70 be a6 |b......4F.6f?p..|
[9237 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 4a 79 9c 97 e2 27 1a 3e 2a 57 1e |0D. [Jy...'.>*W.|
00000010 35 09 ab 03 01 02 1d da 08 bf 41 10 a4 3e a3 51 |5.........A..>.Q|
00000020 a1 e0 eb 6f 02 20 12 84 80 d4 00 41 62 ac 00 e9 |...o. .....Ab...|
00000030 b3 36 5b 47 66 68 62 f3 81 f6 26 3c 19 a8 46 65 |.6[Gfhb...&<..Fe|
00000040 59 5a 7c 7e 54 23 |YZ|~T#|
[9238 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9239 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a06b10 gate 1582330606971328400 evaluation starts
[923a 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a06b10 signed by 0 principal evaluation starts (used [false])
[923b 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a06b10 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[923c 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a06b10 principal evaluation succeeds for identity 0
[923d 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a06b10 gate 1582330606971328400 evaluation succeeds
[923e 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[923f 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9240 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9241 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9242 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9243 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 841 bytes, Signature: 0 bytes
[9244 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9245 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9246 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9247 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9248 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9249 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[924a 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[924b 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[924c 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[924d 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 15 38 8b 9a e7 29 80 9d f9 29 1a e9 47 dc ad |..8...)...)..G..|
00000010 62 d0 bd 0a 18 0b a3 34 46 19 36 66 3f 70 be a6 |b......4F.6f?p..|
[924e 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 4a 79 9c 97 e2 27 1a 3e 2a 57 1e |0D. [Jy...'.>*W.|
00000010 35 09 ab 03 01 02 1d da 08 bf 41 10 a4 3e a3 51 |5.........A..>.Q|
00000020 a1 e0 eb 6f 02 20 12 84 80 d4 00 41 62 ac 00 e9 |...o. .....Ab...|
00000030 b3 36 5b 47 66 68 62 f3 81 f6 26 3c 19 a8 46 65 |.6[Gfhb...&<..Fe|
00000040 59 5a 7c 7e 54 23 |YZ|~T#|
[924f 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9250 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a20830 gate 1582330606976532900 evaluation starts
[9251 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a20830 signed by 0 principal evaluation starts (used [false])
[9252 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a20830 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[9253 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a20830 principal evaluation succeeds for identity 0
[9254 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a20830 gate 1582330606976532900 evaluation succeeds
[9255 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9256 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9257 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9258 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9259 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 86 a1 03 1c d1 40 6d a0 19 24 e4 a3 41 2c d3 |......@m..$..A,.|
00000010 8f e6 57 69 a5 b7 25 c1 a6 4e e0 21 e2 a8 ce a1 |..Wi..%..N.!....|
[925a 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 2e d8 7b 9a 4d 89 16 36 9d 92 |0E.!....{.M..6..|
00000010 64 70 77 24 4b e6 53 51 16 08 a2 39 6f 77 d8 09 |dpw$K.SQ...9ow..|
00000020 eb a1 d6 13 12 02 20 4d a1 92 af 17 b9 5c d3 26 |...... M.....\.&|
00000030 10 58 fe 8e b4 00 3a 4c c7 bc fc ca 75 cd b4 d9 |.X....:L....u...|
00000040 e0 7a a8 65 f2 3a 66 |.z.e.:f|
[925b 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd e1 b8 22 1f 24 02 ff 8c bb 8b d4 09 f2 44 2b |...".$........D+|
00000010 24 15 ac ae 34 6b 27 ea d9 f1 73 8e 65 38 d2 5e |$...4k'...s.e8.^|
[925c 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 50 5a 4e 6e 1f cb be ad d1 ca d0 |0D. QPZNn.......|
00000010 3b 61 ba c1 07 11 9e 9d 84 ed 22 8c 48 57 77 03 |;a........".HWw.|
00000020 51 06 73 d5 02 20 5a b2 8c 74 93 0b f7 ae 3e 97 |Q.s.. Z..t....>.|
00000030 e8 c7 70 fa 42 f9 05 c0 03 3b 72 55 05 c6 84 4b |..p.B....;rU...K|
00000040 97 a2 fb 7c 87 2b |...|.+|
[925d 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[925e 02-22 00:16:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[925f 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9260 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9261 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9262 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9263 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9264 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9265 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 95 69 8f 35 c5 48 e1 2f e6 5b 41 d2 3f 38 ba |$.i.5.H./.[A.?8.|
00000010 d6 f8 0a 74 b0 8e 7e 8b d3 90 16 e4 8a 7f fd 9e |...t..~.........|
[9266 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 00 ad bb 02 79 12 da cc 4b 1c |0E.!......y...K.|
00000010 03 b6 fa 5d ab 3a ba 94 44 65 ae 74 57 f7 86 34 |...].:..De.tW..4|
00000020 25 c1 8b 30 6f 02 20 1a 56 f6 2f 40 c1 6c 50 a5 |%..0o. .V./@.lP.|
00000030 ee 4f af 80 4f 07 52 8c 78 2f 8f 8c a3 c9 4c 9f |.O..O.R.x/....L.|
00000040 14 b2 2a c7 40 85 72 |..*.@.r|
[9267 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9268 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a45020 gate 1582330606981894800 evaluation starts
[9269 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a45020 signed by 0 principal evaluation starts (used [false])
[926a 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a45020 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[926b 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a45020 principal evaluation succeeds for identity 0
[926c 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a45020 gate 1582330606981894800 evaluation succeeds
[926d 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[926e 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[926f 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9270 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9271 02-22 00:16:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9272 02-22 00:16:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9273 02-22 00:16:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9274 02-22 00:16:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[9275 02-22 00:16:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9276 02-22 00:16:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9277 02-22 00:16:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:2616865029196325861 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes to 1 peers
[9278 02-22 00:16:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:2616865029196325861 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[9279 02-22 00:16:47.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[927a 02-22 00:16:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2616865029196325861 , Msg_type: BLOCK_MSG, digests: [1 4 5 6 8 2 3 7 9], Envelope: 60 bytes, Signature: 0 bytes
[927b 02-22 00:16:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2616865029196325861 , Msg_type: BLOCK_MSG, digests: [1 4 5 6 8 2 3 7 9], Envelope: 60 bytes, Signature: 0 bytes
[927c 02-22 00:16:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2616865029196325861 , Msg_type: BLOCK_MSG, digests: [1 4 5 6 8 2 3 7 9], Envelope: 60 bytes, Signature: 0 bytes
[927d 02-22 00:16:47.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[927e 02-22 00:16:47.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[927f 02-22 00:16:47.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[9280 02-22 00:16:47.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9281 02-22 00:16:47.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9282 02-22 00:16:47.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9283 02-22 00:16:47.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6950607813848182030 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[9284 02-22 00:16:47.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6950607813848182030 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[9285 02-22 00:16:47.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:6950607813848182030 msg_type:BLOCK_MSG > , Envelope: 33 bytes, Signature: 0 bytes
[9286 02-22 00:16:47.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 4 6 8 3 5 7 9] to 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[9287 02-22 00:16:47.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9288 02-22 00:16:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[9289 02-22 00:16:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[928a 02-22 00:16:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[928b 02-22 00:16:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[928c 02-22 00:16:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[928d 02-22 00:16:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[928e 02-22 00:16:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[928f 02-22 00:16:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9290 02-22 00:16:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9291 02-22 00:16:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9292 02-22 00:16:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9293 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[9294 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[9295 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9296 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[9297 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[9298 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 c7 68 6e 09 97 07 4e c6 c1 7d 78 fb a6 27 3e |..hn...N..}x..'>|
00000010 42 1d 9a e0 77 1e 7b 62 08 5c aa b7 c5 9d 4c 69 |B...w.{b.\....Li|
[9299 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 6d 38 1c 19 35 6f f9 df 00 97 |0E.!..m8..5o....|
00000010 0f 90 09 28 f6 14 1d 8d 8a f7 3a f7 a0 d6 5b ea |...(......:...[.|
00000020 68 dc d1 b2 06 02 20 01 b0 1d e8 c0 25 ca c7 8d |h..... .....%...|
00000030 61 51 7f df 9d 25 de a7 17 fb bf 75 35 f3 20 9b |aQ...%.....u5. .|
00000040 eb 76 ce 09 c9 3c 3c |.v...<<|
[929a 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[929b 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 5d 73 3d 42 fd 37 b8 63 8a c5 |0E.!..]s=B.7.c..|
00000010 c7 bd dd 11 cc 8c dc 13 26 87 09 ce 26 8b 52 d1 |........&...&.R.|
00000020 5b a4 e2 32 6d 02 20 71 53 6b 82 95 ec 2a 7c 3e |[..2m. qSk...*|>|
00000030 ef 5f 8e 49 bf 2a 07 6a 2b af bc e8 76 4e c7 2c |._.I.*.j+...vN.,|
00000040 47 a8 08 a2 48 64 10 |G...Hd.|
[929c 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[929d 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}
[929e 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:108
[929f 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:108
[92a0 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:107 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[92a1 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92a2 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92a3 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92a4 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92a5 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92a6 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92a7 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[92a8 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92a9 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[92aa 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes
[92ab 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92ac 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes
[92ad 02-22 00:16:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92ae 02-22 00:16:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes
[92af 02-22 00:16:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92b0 02-22 00:16:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes
[92b1 02-22 00:16:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92b2 02-22 00:16:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes
[92b3 02-22 00:16:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes
[92b4 02-22 00:16:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92b5 02-22 00:16:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes
[92b6 02-22 00:16:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92b7 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:107 , Envelope: 83 bytes, Signature: 70 bytes
[92b8 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92b9 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:107 , Envelope: 83 bytes, Signature: 70 bytes
[92ba 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[92bb 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92bc 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[92bd 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[92be 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[92bf 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[92c0 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[92c1 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[92c2 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 40 19 e9 94 26 62 d3 38 bd fe 9b af a0 53 1a |.@...&b.8.....S.|
00000010 41 9d 4b 02 6d 9d 65 6c ce 75 8e 9d 18 3f 5d d5 |A.K.m.el.u...?].|
[92c3 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 7e 49 89 21 d7 e1 c0 e9 94 d5 a4 |0D. j~I.!.......|
00000010 2b 1b 23 e2 af 2e 77 6e e1 c9 26 c7 6f 08 36 6c |+.#...wn..&.o.6l|
00000020 90 f4 a7 76 02 20 53 8e 33 61 36 75 2a ee 4e 37 |...v. S.3a6u*.N7|
00000030 31 14 50 cb a3 0a 93 5a c4 cb 2b af 12 1c ea 77 |1.P....Z..+....w|
00000040 22 c8 53 b4 b3 d2 |".S...|
[92c4 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[92c5 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a67bb0 gate 1582330609249132900 evaluation starts
[92c6 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a67bb0 signed by 0 principal evaluation starts (used [false])
[92c7 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a67bb0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[92c8 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a67bb0 principal evaluation succeeds for identity 0
[92c9 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a67bb0 gate 1582330609249132900 evaluation succeeds
[92ca 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[92cb 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[92cc 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[92cd 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[92ce 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:107 , Envelope: 83 bytes, Signature: 70 bytes
[92cf 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:107 , Envelope: 83 bytes, Signature: 70 bytes]}
[92d0 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:107
[92d1 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:107
[92d2 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:106 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[92d3 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92d4 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92d5 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92d6 02-22 00:16:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92d7 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92d8 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92d9 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92da 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92db 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92dc 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92dd 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:107 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[92de 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92df 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:107 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[92e0 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:107 , Envelope: 83 bytes, Signature: 70 bytes
[92e1 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92e2 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:107 , Envelope: 83 bytes, Signature: 70 bytes
[92e3 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92e4 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:107 , Envelope: 83 bytes, Signature: 70 bytes
[92e5 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:107 , Envelope: 83 bytes, Signature: 70 bytes
[92e6 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92e7 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:107 , Envelope: 83 bytes, Signature: 70 bytes
[92e9 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92e8 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:107 , Envelope: 83 bytes, Signature: 70 bytes
[92ea 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:107 , Envelope: 83 bytes, Signature: 70 bytes
[92eb 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:107 , Envelope: 83 bytes, Signature: 70 bytes
[92ec 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92ed 02-22 00:16:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92ee 02-22 00:16:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Exiting
[92ef 02-22 00:16:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Returning true
[92f0 02-22 00:16:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884CDF3ABAEA4E4FA1510261801
[92f1 02-22 00:16:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8FB9B12749721A166F6720E5EAD0177D4B1EDE645DE3A8D6D25A9902661356F5
[92f2 02-22 00:16:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 : Entering
[92f3 02-22 00:16:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92f4 02-22 00:16:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92f5 02-22 00:16:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92f6 02-22 00:16:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92f7 02-22 00:16:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:38 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers
[92f8 02-22 00:16:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92fa 02-22 00:16:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[92f9 02-22 00:16:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 Timestamp:inc_num:1582330423155680900 seq_num:38 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes
[92fb 02-22 00:16:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[92fc 02-22 00:16:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151066
[92fd 02-22 00:16:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4448A4CF56A4C19B30EE642ADCF53BC6BA6CF147B973FBC32AC81F95AE9A521D
[92fe 02-22 00:16:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[92ff 02-22 00:16:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[9300 02-22 00:16:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s
[9301 02-22 00:16:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9302 02-22 00:16:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9303 02-22 00:16:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9304 02-22 00:16:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:102 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[9305 02-22 00:16:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:102 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers
[9306 02-22 00:16:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:102 , Envelope: 83 bytes, Signature: 70 bytes
[9307 02-22 00:16:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9308 02-22 00:16:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9309 02-22 00:16:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:102 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[930a 02-22 00:16:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[930b 02-22 00:16:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:102 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers
[930c 02-22 00:16:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:102 , Envelope: 83 bytes, Signature: 70 bytes
[930d 02-22 00:16:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[930e 02-22 00:16:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[930f 02-22 00:16:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[9310 02-22 00:16:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9311 02-22 00:16:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[9313 02-22 00:16:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[9312 02-22 00:16:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[9314 02-22 00:16:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9315 02-22 00:16:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9316 02-22 00:16:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9317 02-22 00:16:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9318 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9319 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[931a 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[931b 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ed 4a 59 a4 6f 56 5d fc cb 78 e0 f9 9f 2d c0 |/.JY.oV]..x...-.|
00000010 d4 c1 85 76 75 d8 0a df 40 42 a2 54 ff 38 7f 12 |...vu...@B.T.8..|
[931c 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[931d 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 7d a8 90 cf 43 15 e1 70 b9 07 |0E.!..}...C..p..|
00000010 6c 44 7d 5b 68 11 08 61 0d 1a c6 03 f4 e8 6b a9 |lD}[h..a......k.|
00000020 83 08 6f 78 86 02 20 67 bc 9c 68 d0 7a 32 ec 32 |..ox.. g..h.z2.2|
00000030 d6 21 ae b5 fc eb b7 4d 04 ec 46 b8 02 96 d2 90 |.!.....M..F.....|
00000040 13 69 fb 04 74 0c 3e |.i..t.>|
[931e 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[931f 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b199d0 gate 1582330610161975600 evaluation starts
[9320 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b199d0 signed by 0 principal evaluation starts (used [false])
[9321 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b199d0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[9322 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b199d0 principal evaluation succeeds for identity 0
[9323 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b199d0 gate 1582330610161975600 evaluation succeeds
[9324 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9325 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9326 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9327 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9328 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[9329 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes]}
[932a 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:103
[932b 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:103
[932c 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:102 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[932d 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[932e 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[932f 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9330 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[9331 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9332 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[9333 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9334 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9335 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[9336 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9337 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9338 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9339 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[933a 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[933b 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[933c 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[933d 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[933e 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[933f 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9340 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers
[9341 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[9342 02-22 00:16:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9343 02-22 00:16:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes
[9344 02-22 00:16:50.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9345 02-22 00:16:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:2893420327217890716 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[9346 02-22 00:16:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: tag:EMPTY hello:<nonce:2893420327217890716 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[9347 02-22 00:16:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:2893420327217890716 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[9348 02-22 00:16:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9349 02-22 00:16:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[934a 02-22 00:16:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[934b 02-22 00:16:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[934c 02-22 00:16:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[934d 02-22 00:16:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[934e 02-22 00:16:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[934f 02-22 00:16:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9350 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:109 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[9351 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:109 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[9352 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9353 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:109 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes
[9354 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[9355 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 c5 8a 5f 1f 91 a7 5b ef 91 89 40 ed 44 93 0e |..._...[...@.D..|
00000010 3a 0b 9b 1a b2 1c 98 93 d8 d6 36 30 3b f3 ab 5c |:.........60;..\|
[9356 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 21 03 de 60 3f 27 a3 af 54 d2 2a |0D. .!..`?'..T.*|
00000010 54 81 21 4a 1c 34 b7 e2 c8 6c 96 ab 3a ab 6f 03 |T.!J.4...l..:.o.|
00000020 2b c0 16 f7 02 20 6f 9a 70 79 1f 3d db 7b 94 03 |+.... o.py.=.{..|
00000030 d7 27 fc bc 34 ac d4 77 1c 0e 1e 25 bb 28 c6 50 |.'..4..w...%.(.P|
00000040 9f c8 e7 13 5b 9a |....[.|
[9357 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^|
00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|
[9358 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 00 9e 6d 0b e6 59 8b de 79 32 5a |0D. >..m..Y..y2Z|
00000010 69 67 c8 5a 78 ae db 75 11 99 fb 3a 22 ef bc 7c |ig.Zx..u...:"..||
00000020 6f e6 dd c3 02 20 64 48 60 63 c7 be 08 93 ee 3a |o.... dH`c.....:|
00000030 b3 23 b7 18 27 77 63 f2 d2 d5 dd 43 ff 16 bf ac |.#..'wc....C....|
00000040 8a e3 9b 6b 8c 9d |...k..|
[9359 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:109 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes
[935a 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:109 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}
[935b 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:109
[935c 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:109
[935d 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership
[935e 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[935f 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9360 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9361 02-22 00:16:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[9362 02-22 00:16:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9363 02-22 00:16:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9364 02-22 00:16:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers
[9365 02-22 00:16:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 2, Dead: 0
[9366 02-22 00:16:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes
[9367 02-22 00:16:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9368 02-22 00:16:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello:<nonce:7027236602550484212 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[9369 02-22 00:16:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: tag:EMPTY hello:<nonce:7027236602550484212 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[936a 02-22 00:16:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:7027236602550484212 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[936b 02-22 00:16:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[936c 02-22 00:16:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[936d 02-22 00:16:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: tag:EMPTY hello:<nonce:11345945482408843100 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[936e 02-22 00:16:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello:<nonce:11345945482408843100 msg_type:IDENTITY_MSG > , Envelope: 17 bytes, Signature: 0 bytes
[936f 02-22 00:16:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9370 02-22 00:16:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9371 02-22 00:16:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9372 02-22 00:16:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9373 02-22 00:16:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9374 02-22 00:16:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9375 02-22 00:16:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76] to 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[9376 02-22 00:16:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9377 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051
[9378 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:318417762244955315 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[9379 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051
[937a 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:6211953187744877701 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[937b 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051
[937c 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello:<nonce:3037206004751738917 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes to 1 peers
[937d 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:3037206004751738917 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[937e 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[937f 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:6211953187744877701 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[9380 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9381 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello:<nonce:318417762244955315 msg_type:IDENTITY_MSG > , Envelope: 16 bytes, Signature: 0 bytes
[9382 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9383 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6211953187744877701 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[9384 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6211953187744877701 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[9385 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 6211953187744877701 , Msg_type: IDENTITY_MSG, digests: [1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9], Envelope: 153 bytes, Signature: 0 bytes
[9386 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9387 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3037206004751738917 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[9388 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3037206004751738917 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[9389 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3037206004751738917 , Msg_type: IDENTITY_MSG, digests: [c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8], Envelope: 153 bytes, Signature: 0 bytes
[938a 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[938b 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 318417762244955315 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[938c 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 318417762244955315 , Msg_type: IDENTITY_MSG, digests: [673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76], Envelope: 153 bytes, Signature: 0 bytes
[938d 02-22 00:16:50.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[938e 02-22 00:16:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[938f 02-22 00:16:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9390 02-22 00:16:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes
[9391 02-22 00:16:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[9392 02-22 00:16:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9393 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9394 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9395 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9396 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9397 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9398 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9399 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 cd cd 68 5a bc 16 80 58 91 fa 58 6d 8d 29 13 |...hZ...X..Xm.).|
00000010 15 15 4b e7 70 ac 4f 97 bc c3 38 92 9e bc 25 21 |..K.p.O...8...%!|
[939a 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 e2 73 a9 f2 0a 47 84 12 0e 78 |0E.!...s...G...x|
00000010 59 21 5c 8d 6f 27 e5 e2 9b 20 53 8f f8 a0 54 c8 |Y!\.o'... S...T.|
00000020 48 80 0f c7 0c 02 20 7a 8c a5 90 ce c4 d1 76 90 |H..... z......v.|
00000030 b6 4f 76 20 44 ec 51 c2 be 7e 57 e7 55 c5 d7 59 |.Ov D.Q..~W.U..Y|
00000040 c4 ac ad 7a 86 35 37 |...z.57|
[939b 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[939c 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcb1e0 gate 1582330610484066300 evaluation starts
[939d 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcb1e0 signed by 0 principal evaluation starts (used [false])
[939e 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcb1e0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[939f 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcb1e0 principal evaluation succeeds for identity 0
[93a0 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcb1e0 gate 1582330610484066300 evaluation succeeds
[93a1 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[93a2 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[93a3 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[93a4 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[93a5 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes
[93a6 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes]}
[93a7 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:108
[93a8 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:108
[93a9 02-22 00:16:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:107 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership
[93aa 02-22 00:16:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93ab 02-22 00:16:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93ac 02-22 00:16:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93ad 02-22 00:16:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76
[93ae 02-22 00:16:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93af 02-22 00:16:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93b0 02-22 00:16:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93b1 02-22 00:16:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers
[93b2 02-22 00:16:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[93b3 02-22 00:16:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[93b4 02-22 00:16:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93b5 02-22 00:16:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...F6E9120C08A8F3C0928AA4E4FA151067
[93b6 02-22 00:16:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5CFDB72CD7439F1490C44EF5496CC41A07E37C4A602D1BD129868C87B9B6C82A
[93b7 02-22 00:16:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531
[93b8 02-22 00:16:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160
[93b9 02-22 00:16:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93ba 02-22 00:16:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[93bb 02-22 00:16:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93bc 02-22 00:16:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers
[93bd 02-22 00:16:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers
[93be 02-22 00:16:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[93bf 02-22 00:16:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes
[93c0 02-22 00:16:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93c1 02-22 00:16:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93c2 02-22 00:16:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[93c3 02-22 00:16:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93c4 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[93c5 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[93c6 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93c7 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes
[93c8 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[93c9 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c fd b7 2c d7 43 9f 14 90 c4 4e f5 49 6c c4 1a |\..,.C....N.Il..|
00000010 07 e3 7c 4a 60 2d 1b d1 29 86 8c 87 b9 b6 c8 2a |..|J`-..)......*|
[93ca 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 48 01 0e 64 a1 04 5f 9d d5 6c bc |0D. 5H..d.._..l.|
00000010 43 95 37 62 4d 60 5f 39 03 98 8c 9f 34 03 c9 cd |C.7bM`_9....4...|
00000020 8d 0c 93 ef 02 20 68 64 94 64 32 ea 74 0d 99 2d |..... hd.d2.t..-|
00000030 bb 54 63 36 fb 11 90 f0 cb 2d a5 1d 20 7e b6 07 |.Tc6.....-.. ~..|
00000040 00 2c 2a f5 5d 1a |.,*.].|
[93cb 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes
[93cc 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes
[93cd 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93ce 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[93cf 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 c5 8a 5f 1f 91 a7 5b ef 91 89 40 ed 44 93 0e |..._...[...@.D..|
00000010 3a 0b 9b 1a b2 1c 98 93 d8 d6 36 30 3b f3 ab 5c |:.........60;..\|
[93d0 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 21 03 de 60 3f 27 a3 af 54 d2 2a |0D. .!..`?'..T.*|
00000010 54 81 21 4a 1c 34 b7 e2 c8 6c 96 ab 3a ab 6f 03 |T.!J.4...l..:.o.|
00000020 2b c0 16 f7 02 20 6f 9a 70 79 1f 3d db 7b 94 03 |+.... o.py.=.{..|
00000030 d7 27 fc bc 34 ac d4 77 1c 0e 1e 25 bb 28 c6 50 |.'..4..w...%.(.P|
00000040 9f c8 e7 13 5b 9a |....[.|
[93d1 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:109 , Envelope: 83 bytes, Signature: 70 bytes
[93d2 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93d3 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 from identity store
[93d4 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[93d5 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[93d6 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[93d7 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[93d8 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[93d9 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[93da 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[93db 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 cd cd 68 5a bc 16 80 58 91 fa 58 6d 8d 29 13 |...hZ...X..Xm.).|
00000010 15 15 4b e7 70 ac 4f 97 bc c3 38 92 9e bc 25 21 |..K.p.O...8...%!|
[93dc 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 e2 73 a9 f2 0a 47 84 12 0e 78 |0E.!...s...G...x|
00000010 59 21 5c 8d 6f 27 e5 e2 9b 20 53 8f f8 a0 54 c8 |Y!\.o'... S...T.|
00000020 48 80 0f c7 0c 02 20 7a 8c a5 90 ce c4 d1 76 90 |H..... z......v.|
00000030 b6 4f 76 20 44 ec 51 c2 be 7e 57 e7 55 c5 d7 59 |.Ov D.Q..~W.U..Y|
00000040 c4 ac ad 7a 86 35 37 |...z.57|
[93dd 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[93de 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26320 gate 1582330610565046800 evaluation starts
[93df 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26320 signed by 0 principal evaluation starts (used [false])
[93e0 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26320 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[93e1 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26320 principal evaluation succeeds for identity 0
[93e2 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26320 gate 1582330610565046800 evaluation succeeds
[93e3 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[93e4 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[93e6 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[93e7 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[93e5 02-22 00:16:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[93e8 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[93e9 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76Identity:Timestamp:inc_num:1582330413520500700 seq_num:108 , Envelope: 83 bytes, Signature: 71 bytes
[93ea 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93eb 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93ec 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes
[93ed 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[93ee 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93ef 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[93f0 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c fd b7 2c d7 43 9f 14 90 c4 4e f5 49 6c c4 1a |\..,.C....N.Il..|
00000010 07 e3 7c 4a 60 2d 1b d1 29 86 8c 87 b9 b6 c8 2a |..|J`-..)......*|
[93f1 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 48 01 0e 64 a1 04 5f 9d d5 6c bc |0D. 5H..d.._..l.|
00000010 43 95 37 62 4d 60 5f 39 03 98 8c 9f 34 03 c9 cd |C.7bM`_9....4...|
00000020 8d 0c 93 ef 02 20 68 64 94 64 32 ea 74 0d 99 2d |..... hd.d2.t..-|
00000030 bb 54 63 36 fb 11 90 f0 cb 2d a5 1d 20 7e b6 07 |.Tc6.....-.. ~..|
00000040 00 2c 2a f5 5d 1a |.,*.].|
[93f2 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...|
00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|
[93f3 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 46 1c 22 f0 53 73 19 18 3a 73 |0E.!..F.".Ss..:s|
00000010 eb 65 1d 3b ae 74 be 22 15 34 df 31 60 b8 51 72 |.e.;.t.".4.1`.Qr|
00000020 a6 40 76 f4 b5 02 20 2a 73 0c 37 11 19 98 2c f1 |.@v... *s.7...,.|
00000030 3b 14 bb 7b 09 ff f1 f4 a7 3c f0 8a a6 44 f4 78 |;..{.....<...D.x|
00000040 88 e0 cd 3c 63 ca 7c |...<c.||
[93f4 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[93f5 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes
[93f6 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93f7 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93f8 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[93f9 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9 from identity store
[93fa 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c fd b7 2c d7 43 9f 14 90 c4 4e f5 49 6c c4 1a |\..,.C....N.Il..|
00000010 07 e3 7c 4a 60 2d 1b d1 29 86 8c 87 b9 b6 c8 2a |..|J`-..)......*|
[93fb 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 48 01 0e 64 a1 04 5f 9d d5 6c bc |0D. 5H..d.._..l.|
00000010 43 95 37 62 4d 60 5f 39 03 98 8c 9f 34 03 c9 cd |C.7bM`_9....4...|
00000020 8d 0c 93 ef 02 20 68 64 94 64 32 ea 74 0d 99 2d |..... hd.d2.t..-|
00000030 bb 54 63 36 fb 11 90 f0 cb 2d a5 1d 20 7e b6 07 |.Tc6.....-.. ~..|
00000040 00 2c 2a f5 5d 1a |.,*.].|
[93fc 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes
[93fd 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4a11870756af4c87c195b5a5a9173d49216c3cd8f39f8fb97f1ffc68a97f6e9Identity:Timestamp:inc_num:1582330413438745000 seq_num:103 , Envelope: 83 bytes, Signature: 70 bytes
[93fe 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[93ff 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 from identity store
[9400 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 c5 8a 5f 1f 91 a7 5b ef 91 89 40 ed 44 93 0e |..._...[...@.D..|
00000010 3a 0b 9b 1a b2 1c 98 93 d8 d6 36 30 3b f3 ab 5c |:.........60;..\|
[9401 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9402 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 21 03 de 60 3f 27 a3 af 54 d2 2a |0D. .!..`?'..T.*|
00000010 54 81 21 4a 1c 34 b7 e2 c8 6c 96 ab 3a ab 6f 03 |T.!J.4...l..:.o.|
00000020 2b c0 16 f7 02 20 6f 9a 70 79 1f 3d db 7b 94 03 |+.... o.py.=.{..|
00000030 d7 27 fc bc 34 ac d4 77 1c 0e 1e 25 bb 28 c6 50 |.'..4..w...%.(.P|
00000040 9f c8 e7 13 5b 9a |....[.|
[9403 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8Identity:Timestamp:inc_num:1582330413427424700 seq_num:109 , Envelope: 83 bytes, Signature: 70 bytes
[9404 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9405 02-22 00:16:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9406 02-22 00:16:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:104 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[9407 02-22 00:16:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:104 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[9408 02-22 00:16:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9409 02-22 00:16:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:104 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes
[940a 02-22 00:16:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 from identity store
[940b 02-22 00:16:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[940c 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[940d 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[940e 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[940f 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9410 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9411 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9412 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c ed 5f 5b c5 ef a2 d9 44 cd fc c7 79 cb e4 f3 |.._[....D...y...|
00000010 7f 87 70 b8 62 82 0c 47 91 5f fa 26 49 53 a0 9e |..p.b..G._.&IS..|
[9413 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 ee 9f 4e b1 b3 60 0c a7 0a 6a a3 |0D. X..N..`...j.|
00000010 40 36 73 c1 84 40 f2 a6 6d bb 61 6b f9 0a 30 40 |@6s..@..m.ak..0@|
00000020 73 c2 8a f9 02 20 62 2f 03 8f f9 44 f7 c0 2d 86 |s.... b/...D..-.|
00000030 c8 7d 68 f3 bd c5 b6 32 c5 cc 89 3b 53 94 54 bf |.}h....2...;S.T.|
00000040 de 50 55 05 a2 8a |.PU...|
[9414 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9415 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c60f80 gate 1582330610643296400 evaluation starts
[9416 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c60f80 signed by 0 principal evaluation starts (used [false])
[9417 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c60f80 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[9418 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c60f80 principal evaluation succeeds for identity 0
[9419 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c60f80 gate 1582330610643296400 evaluation succeeds
[941a 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[941b 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[941c 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[941d 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[941e 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:104 , Envelope: 83 bytes, Signature: 70 bytes
[941f 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:104 , Envelope: 83 bytes, Signature: 70 bytes]}
[9420 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:104
[9421 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:104
[9422 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09Identity:Timestamp:inc_num:1582330413587055600 seq_num:103 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership
[9423 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9424 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9425 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9426 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09
[9427 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9428 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9429 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[942a 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers
[942b 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with MembershipResponse with Alive: 4, Dead: 0
[942c 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes
[942d 02-22 00:16:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[942e 02-22 00:16:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[942f 02-22 00:16:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9430 02-22 00:16:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes to 3 peers
[9431 02-22 00:16:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[9432 02-22 00:16:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[9433 02-22 00:16:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9434 02-22 00:16:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9435 02-22 00:16:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:675ef7200589c79eadee3e52fe6b4d69577d66c3a46f2f28e676f87bd17dc347, Envelope: 39 bytes, Signature: 0 bytes
[9436 02-22 00:16:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9437 02-22 00:16:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 841 bytes, Signature: 0 bytes
[9438 02-22 00:16:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 841 bytes, Signature: 0 bytes
[9439 02-22 00:16:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd e1 b8 22 1f 24 02 ff 8c bb 8b d4 09 f2 44 2b |...".$........D+|
00000010 24 15 ac ae 34 6b 27 ea d9 f1 73 8e 65 38 d2 5e |$...4k'...s.e8.^|
[943a 02-22 00:16:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 50 5a 4e 6e 1f cb be ad d1 ca d0 |0D. QPZNn.......|
00000010 3b 61 ba c1 07 11 9e 9d 84 ed 22 8c 48 57 77 03 |;a........".HWw.|
00000020 51 06 73 d5 02 20 5a b2 8c 74 93 0b f7 ae 3e 97 |Q.s.. Z..t....>.|
00000030 e8 c7 70 fa 42 f9 05 c0 03 3b 72 55 05 c6 84 4b |..p.B....;rU...K|
00000040 97 a2 fb 7c 87 2b |...|.+|
[943b 02-22 00:16:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 86 a1 03 1c d1 40 6d a0 19 24 e4 a3 41 2c d3 |......@m..$..A,.|
00000010 8f e6 57 69 a5 b7 25 c1 a6 4e e0 21 e2 a8 ce a1 |..Wi..%..N.!....|
[943c 02-22 00:16:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 2e d8 7b 9a 4d 89 16 36 9d 92 |0E.!....{.M..6..|
00000010 64 70 77 24 4b e6 53 51 16 08 a2 39 6f 77 d8 09 |dpw$K.SQ...9ow..|
00000020 eb a1 d6 13 12 02 20 4d a1 92 af 17 b9 5c d3 26 |...... M.....\.&|
00000030 10 58 fe 8e b4 00 3a 4c c7 bc fc ca 75 cd b4 d9 |.X....:L....u...|
00000040 e0 7a a8 65 f2 3a 66 |.z.e.:f|
[943d 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[943e 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[943f 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9440 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9441 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9442 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9443 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9444 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9445 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 15 38 8b 9a e7 29 80 9d f9 29 1a e9 47 dc ad |..8...)...)..G..|
00000010 62 d0 bd 0a 18 0b a3 34 46 19 36 66 3f 70 be a6 |b......4F.6f?p..|
[9446 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 4a 79 9c 97 e2 27 1a 3e 2a 57 1e |0D. [Jy...'.>*W.|
00000010 35 09 ab 03 01 02 1d da 08 bf 41 10 a4 3e a3 51 |5.........A..>.Q|
00000020 a1 e0 eb 6f 02 20 12 84 80 d4 00 41 62 ac 00 e9 |...o. .....Ab...|
00000030 b3 36 5b 47 66 68 62 f3 81 f6 26 3c 19 a8 46 65 |.6[Gfhb...&<..Fe|
00000040 59 5a 7c 7e 54 23 |YZ|~T#|
[9447 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9448 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb32f0 gate 1582330610941131200 evaluation starts
[9449 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb32f0 signed by 0 principal evaluation starts (used [false])
[944a 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb32f0 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[944b 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb32f0 principal evaluation succeeds for identity 0
[944c 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb32f0 gate 1582330610941131200 evaluation succeeds
[944d 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[944e 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[944f 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9450 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9451 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9452 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9453 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9454 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9455 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9456 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9457 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9458 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9459 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 95 69 8f 35 c5 48 e1 2f e6 5b 41 d2 3f 38 ba |$.i.5.H./.[A.?8.|
00000010 d6 f8 0a 74 b0 8e 7e 8b d3 90 16 e4 8a 7f fd 9e |...t..~.........|
[945a 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 00 ad bb 02 79 12 da cc 4b 1c |0E.!......y...K.|
00000010 03 b6 fa 5d ab 3a ba 94 44 65 ae 74 57 f7 86 34 |...].:..De.tW..4|
00000020 25 c1 8b 30 6f 02 20 1a 56 f6 2f 40 c1 6c 50 a5 |%..0o. .V./@.lP.|
00000030 ee 4f af 80 4f 07 52 8c 78 2f 8f 8c a3 c9 4c 9f |.O..O.R.x/....L.|
00000040 14 b2 2a c7 40 85 72 |..*.@.r|
[945b 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[945c 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cccd60 gate 1582330610942473100 evaluation starts
[945d 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cccd60 signed by 0 principal evaluation starts (used [false])
[945e 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cccd60 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[945f 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cccd60 principal evaluation succeeds for identity 0
[9460 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cccd60 gate 1582330610942473100 evaluation succeeds
[9461 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9462 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9463 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9464 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9465 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9466 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 841 bytes, Signature: 0 bytes
[9467 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9468 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9469 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[946a 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[946b 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[946c 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[946d 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[946e 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[946f 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9470 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 15 38 8b 9a e7 29 80 9d f9 29 1a e9 47 dc ad |..8...)...)..G..|
00000010 62 d0 bd 0a 18 0b a3 34 46 19 36 66 3f 70 be a6 |b......4F.6f?p..|
[9471 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 4a 79 9c 97 e2 27 1a 3e 2a 57 1e |0D. [Jy...'.>*W.|
00000010 35 09 ab 03 01 02 1d da 08 bf 41 10 a4 3e a3 51 |5.........A..>.Q|
00000020 a1 e0 eb 6f 02 20 12 84 80 d4 00 41 62 ac 00 e9 |...o. .....Ab...|
00000030 b3 36 5b 47 66 68 62 f3 81 f6 26 3c 19 a8 46 65 |.6[Gfhb...&<..Fe|
00000040 59 5a 7c 7e 54 23 |YZ|~T#|
[9472 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9473 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ce4a80 gate 1582330610943757000 evaluation starts
[9474 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ce4a80 signed by 0 principal evaluation starts (used [false])
[9475 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ce4a80 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[9476 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ce4a80 principal evaluation succeeds for identity 0
[9477 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ce4a80 gate 1582330610943757000 evaluation succeeds
[9478 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9479 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[947a 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[947b 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[947c 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 86 a1 03 1c d1 40 6d a0 19 24 e4 a3 41 2c d3 |......@m..$..A,.|
00000010 8f e6 57 69 a5 b7 25 c1 a6 4e e0 21 e2 a8 ce a1 |..Wi..%..N.!....|
[947d 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 2e d8 7b 9a 4d 89 16 36 9d 92 |0E.!....{.M..6..|
00000010 64 70 77 24 4b e6 53 51 16 08 a2 39 6f 77 d8 09 |dpw$K.SQ...9ow..|
00000020 eb a1 d6 13 12 02 20 4d a1 92 af 17 b9 5c d3 26 |...... M.....\.&|
00000030 10 58 fe 8e b4 00 3a 4c c7 bc fc ca 75 cd b4 d9 |.X....:L....u...|
00000040 e0 7a a8 65 f2 3a 66 |.z.e.:f|
[947e 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd e1 b8 22 1f 24 02 ff 8c bb 8b d4 09 f2 44 2b |...".$........D+|
00000010 24 15 ac ae 34 6b 27 ea d9 f1 73 8e 65 38 d2 5e |$...4k'...s.e8.^|
[947f 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 50 5a 4e 6e 1f cb be ad d1 ca d0 |0D. QPZNn.......|
00000010 3b 61 ba c1 07 11 9e 9d 84 ed 22 8c 48 57 77 03 |;a........".HWw.|
00000020 51 06 73 d5 02 20 5a b2 8c 74 93 0b f7 ae 3e 97 |Q.s.. Z..t....>.|
00000030 e8 c7 70 fa 42 f9 05 c0 03 3b 72 55 05 c6 84 4b |..p.B....;rU...K|
00000040 97 a2 fb 7c 87 2b |...|.+|
[9480 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9481 02-22 00:16:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9483 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[9484 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[9485 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[9486 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9487 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9488 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9489 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 95 69 8f 35 c5 48 e1 2f e6 5b 41 d2 3f 38 ba |$.i.5.H./.[A.?8.|
00000010 d6 f8 0a 74 b0 8e 7e 8b d3 90 16 e4 8a 7f fd 9e |...t..~.........|
[948a 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 00 ad bb 02 79 12 da cc 4b 1c |0E.!......y...K.|
00000010 03 b6 fa 5d ab 3a ba 94 44 65 ae 74 57 f7 86 34 |...].:..De.tW..4|
00000020 25 c1 8b 30 6f 02 20 1a 56 f6 2f 40 c1 6c 50 a5 |%..0o. .V./@.lP.|
00000030 ee 4f af 80 4f 07 52 8c 78 2f 8f 8c a3 c9 4c 9f |.O..O.R.x/....L.|
00000040 14 b2 2a c7 40 85 72 |..*.@.r|
[948b 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[948c 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d05270 gate 1582330610956555600 evaluation starts
[948d 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d05270 signed by 0 principal evaluation starts (used [false])
[948e 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d05270 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[948f 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d05270 principal evaluation succeeds for identity 0
[9490 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d05270 gate 1582330610956555600 evaluation succeeds
[9491 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[9492 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9493 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[9494 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[9495 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[9482 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 841 bytes, Signature: 0 bytes
[9496 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 841 bytes, Signature: 0 bytes
[9497 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9498 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9499 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[949a 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer0.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[949b 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[949c 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[949d 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[949e 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[949f 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[94a0 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 95 69 8f 35 c5 48 e1 2f e6 5b 41 d2 3f 38 ba |$.i.5.H./.[A.?8.|
00000010 d6 f8 0a 74 b0 8e 7e 8b d3 90 16 e4 8a 7f fd 9e |...t..~.........|
[94a1 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 00 ad bb 02 79 12 da cc 4b 1c |0E.!......y...K.|
00000010 03 b6 fa 5d ab 3a ba 94 44 65 ae 74 57 f7 86 34 |...].:..De.tW..4|
00000020 25 c1 8b 30 6f 02 20 1a 56 f6 2f 40 c1 6c 50 a5 |%..0o. .V./@.lP.|
00000030 ee 4f af 80 4f 07 52 8c 78 2f 8f 8c a3 c9 4c 9f |.O..O.R.x/....L.|
00000040 14 b2 2a c7 40 85 72 |..*.@.r|
[94a2 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[94a3 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d4afa0 gate 1582330610959130200 evaluation starts
[94a4 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d4afa0 signed by 0 principal evaluation starts (used [false])
[94a5 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d4afa0 processing identity 0 - &{Org2MSP 32d6230724c7cbb07dcdd638d059852e5bcc0fcf210c2f3ee92157ba5764b7e6}
[94a6 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d4afa0 principal evaluation succeeds for identity 0
[94a7 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d4afa0 gate 1582330610959130200 evaluation succeeds
[94a8 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[94a9 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[94aa 02-22 00:16:50.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[94ab 02-22 00:16:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[94ac 02-22 00:16:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 86 a1 03 1c d1 40 6d a0 19 24 e4 a3 41 2c d3 |......@m..$..A,.|
00000010 8f e6 57 69 a5 b7 25 c1 a6 4e e0 21 e2 a8 ce a1 |..Wi..%..N.!....|
[94ad 02-22 00:16:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 2e d8 7b 9a 4d 89 16 36 9d 92 |0E.!....{.M..6..|
00000010 64 70 77 24 4b e6 53 51 16 08 a2 39 6f 77 d8 09 |dpw$K.SQ...9ow..|
00000020 eb a1 d6 13 12 02 20 4d a1 92 af 17 b9 5c d3 26 |...... M.....\.&|
00000030 10 58 fe 8e b4 00 3a 4c c7 bc fc ca 75 cd b4 d9 |.X....:L....u...|
00000040 e0 7a a8 65 f2 3a 66 |.z.e.:f|
[94ae 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd e1 b8 22 1f 24 02 ff 8c bb 8b d4 09 f2 44 2b |...".$........D+|
00000010 24 15 ac ae 34 6b 27 ea d9 f1 73 8e 65 38 d2 5e |$...4k'...s.e8.^|
[94af 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 50 5a 4e 6e 1f cb be ad d1 ca d0 |0D. QPZNn.......|
00000010 3b 61 ba c1 07 11 9e 9d 84 ed 22 8c 48 57 77 03 |;a........".HWw.|
00000020 51 06 73 d5 02 20 5a b2 8c 74 93 0b f7 ae 3e 97 |Q.s.. Z..t....>.|
00000030 e8 c7 70 fa 42 f9 05 c0 03 3b 72 55 05 c6 84 4b |..p.B....;rU...K|
00000040 97 a2 fb 7c 87 2b |...|.+|
[94b0 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94b1 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94b2 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded {"CN":"peer1.org2.example.com","Issuer-CN":"ca.org2.example.com","Issuer-L-ST-C":"[San Francisco]-[]-[US]","Issuer-OU":null,"L-ST-C":"[San Francisco]-[]-[US]","MSP":"Org2MSP","OU":["peer"]} on [businesschannel]
[94b3 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel]
[94b4 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true]
[94b5 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[94b6 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[94b7 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[94b8 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 15 38 8b 9a e7 29 80 9d f9 29 1a e9 47 dc ad |..8...)...)..G..|
00000010 62 d0 bd 0a 18 0b a3 34 46 19 36 66 3f 70 be a6 |b......4F.6f?p..|
[94b9 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 4a 79 9c 97 e2 27 1a 3e 2a 57 1e |0D. [Jy...'.>*W.|
00000010 35 09 ab 03 01 02 1d da 08 bf 41 10 a4 3e a3 51 |5.........A..>.Q|
00000020 a1 e0 eb 6f 02 20 12 84 80 d4 00 41 62 ac 00 e9 |...o. .....Ab...|
00000030 b3 36 5b 47 66 68 62 f3 81 f6 26 3c 19 a8 46 65 |.6[Gfhb...&<..Fe|
00000040 59 5a 7c 7e 54 23 |YZ|~T#|
[94ba 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[94bb 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65790 gate 1582330610975178500 evaluation starts
[94bc 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65790 signed by 0 principal evaluation starts (used [false])
[94bd 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65790 processing identity 0 - &{Org2MSP e0e42779f87f07b841bbd5578ebca9faf201fdc2f482079f79b198501c8a4421}
[94be 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65790 principal evaluation succeeds for identity 0
[94bf 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65790 gate 1582330610975178500 evaluation succeeds
[94c0 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers
[94c1 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[94c2 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[94c3 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[94c4 02-22 00:16:50.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[94c5 02-22 00:16:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94c6 02-22 00:16:51.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94c7 02-22 00:16:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051
[94c8 02-22 00:16:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94c9 02-22 00:16:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94ca 02-22 00:16:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:13196424927527760040 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes to 1 peers
[94cb 02-22 00:16:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:13196424927527760040 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[94cc 02-22 00:16:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[94cd 02-22 00:16:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 13196424927527760040 , Msg_type: BLOCK_MSG, digests: [2 3 7 9 8 1 4 5 6], Envelope: 61 bytes, Signature: 0 bytes
[94ce 02-22 00:16:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 13196424927527760040 , Msg_type: BLOCK_MSG, digests: [2 3 7 9 8 1 4 5 6], Envelope: 61 bytes, Signature: 0 bytes
[94cf 02-22 00:16:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 13196424927527760040 , Msg_type: BLOCK_MSG, digests: [2 3 7 9 8 1 4 5 6], Envelope: 61 bytes, Signature: 0 bytes
[94d0 02-22 00:16:51.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[94d1 02-22 00:16:51.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[94d2 02-22 00:16:51.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:83a407a3e1bb0bfe6a7c16289d0d6c575f09bb2cac31e3b3a455b123eda0d8ef, Envelope: 39 bytes, Signature: 0 bytes
[94d3 02-22 00:16:51.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94d4 02-22 00:16:51.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94d5 02-22 00:16:51.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[94d6 02-22 00:16:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:10032387578316642626 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[94d7 02-22 00:16:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:10032387578316642626 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[94d8 02-22 00:16:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello:<nonce:10032387578316642626 msg_type:BLOCK_MSG > , Envelope: 34 bytes, Signature: 0 bytes
[94d9 02-22 00:16:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 4 6 8 3 5 7 9] to 172.18.0.6:7051 673243be4a2ffa7066ddf617b48313a9e453df26b52a2fde2f09b455557b46c8
[94da 02-22 00:16:51.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[94db 02-22 00:16:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[94dc 02-22 00:16:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 1b2dcecfaa10984854c5b2319787440e1f94677daf6c3194e0e4bf6018514e09 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:5fa512057ae337547c7200a53ea0b3fb117544bf941d2aa685a48ce9091fcbbe, Envelope: 39 bytes, Signature: 0 bytes
[94dd 02-22 00:16:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94de 02-22 00:16:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94df 02-22 00:16:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94e0 02-22 00:16:51.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[94e1 02-22 00:16:52.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:37874 025740addca5016bf8441fe81ce4796eb65b14aa9aff595dfc15ab1ad967ba76 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:31cfed914a000f06819124908380a79b3b31fcde035d37f17d192191a32cb4b7, Envelope: 39 bytes, Signature: 0 bytes
[94e2 02-22 00:16:52.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94e3 02-22 00:16:52.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94e4 02-22 00:16:52.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[94e5 02-22 00:16:52.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting
[94e6 02-22 00:16:52.28 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:45114
[94e7 02-22 00:16:52.28 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel= txID=fb73bf2a mspID=Org1MSP
[94e8 02-22 00:16:52.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 39 c4 fb ce 7a 41 53 1e 5f e4 8a cc 05 4f 45 |.9...zAS._....OE|
00000010 46 3c 30 59 e7 62 bb e6 63 e9 fa 33 f1 4d 88 06 |F<0Y.b..c..3.M..|
[94e9 02-22 00:16:52.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de da 89 01 60 0c b6 ec 4a 41 94 |0E.!.....`...JA.|
00000010 37 d7 3d fe ec f0 14 a4 60 e1 bb b1 cf 44 b8 63 |7.=.....`....D.c|
00000020 96 de 21 1f ce 02 20 3d a9 e9 7b c8 5d e6 b6 cf |..!... =..{.]...|
00000030 f6 b8 c7 13 00 e8 87 8c fa b3 4f 7d 37 3b 4d 15 |..........O}7;M.|
00000040 0a 61 89 14 c1 7f 82 |.a.....|
[94ea 02-22 00:16:52.29 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel= txID=fb73bf2a mspID=Org1MSP
[94eb 02-22 00:16:52.29 UTC] [%{longpkg}] %{callpath} -> DEBU [fb73bf2a] getting chaincode data for cscc on channel
[94ec 02-22 00:16:52.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[94ed 02-22 00:16:52.29 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels
[94ee 02-22 00:16:52.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 39 c4 fb ce 7a 41 53 1e 5f e4 8a cc 05 4f 45 |.9...zAS._....OE|
00000010 46 3c 30 59 e7 62 bb e6 63 e9 fa 33 f1 4d 88 06 |F<0Y.b..c..3.M..|
[94ef 02-22 00:16:52.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de da 89 01 60 0c b6 ec 4a 41 94 |0E.!.....`...JA.|
00000010 37 d7 3d fe ec f0 14 a4 60 e1 bb b1 cf 44 b8 63 |7.=.....`....D.c|
00000020 96 de 21 1f ce 02 20 3d a9 e9 7b c8 5d e6 b6 cf |..!... =..{.]...|
00000030 f6 b8 c7 13 00 e8 87 8c fa b3 4f 7d 37 3b 4d 15 |..........O}7;M.|
00000040 0a 61 89 14 c1 7f 82 |.a.....|
[94f0 02-22 00:16:52.29 UTC] [%{longpkg}] %{callpath} -> DEBU [fb73bf2a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[94f1 02-22 00:16:52.29 UTC] [%{longpkg}] %{callpath} -> DEBU [fb73bf2a] notifying Txid:fb73bf2ad8e4aadb5aab8c2281b6e1808163110b95f5c2edd96f18f15395257d, channelID:
[94f2 02-22 00:16:52.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[94f3 02-22 00:16:52.29 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: cscc duration: 2ms channel= txID=fb73bf2a
[94f4 02-22 00:16:52.29 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45114 grpc.code=OK grpc.call_duration=4.2306ms
[94f5 02-22 00:16:52.29 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:45114: read: connection reset by peer
[94f6 02-22 00:16:52.29 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[94f7 02-22 00:16:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU request from 172.18.0.9:45122
[94f8 02-22 00:16:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid channel= txID=3106125b mspID=Org1MSP
[94f9 02-22 00:16:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4c c2 30 60 0f 46 0c 7d fe ce c5 a6 16 c9 cd 80 |L.0`.F.}........|
00000010 2e 3f d6 53 4a 03 09 ce 2f e0 5d 7e e8 ab 6b 62 |.?.SJ.../.]~..kb|
[94fa 02-22 00:16:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 20 7f b6 da 3f 19 22 d5 34 1c 05 |0D. g ...?.".4..|
00000010 07 fc c0 76 75 e0 3d ee 60 89 52 36 0a 53 8a 77 |...vu.=.`.R6.S.w|
00000020 af af aa 84 02 20 5e 96 e9 f0 4b 4c 1d dc a3 d2 |..... ^...KL....|
00000030 15 61 d7 fd 60 44 be 91 04 23 5e 97 f0 0f 88 8b |.a..`D...#^.....|
00000040 15 d7 61 81 d4 08 |..a...|
[94fb 02-22 00:16:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU signature is valid channel= txID=3106125b mspID=Org1MSP
[94fc 02-22 00:16:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU [3106125b] getting chaincode data for qscc on channel
[94fd 02-22 00:16:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entry
[94fe 02-22 00:16:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel
[94ff 02-22 00:16:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo
[9500 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers)
[9501 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers ==
[9502 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign
[9503 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==
[9504 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity
[9505 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
[9506 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4c c2 30 60 0f 46 0c 7d fe ce c5 a6 16 c9 cd 80 |L.0`.F.}........|
00000010 2e 3f d6 53 4a 03 09 ce 2f e0 5d 7e e8 ab 6b 62 |.?.SJ.../.]~..kb|
[9507 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 20 7f b6 da 3f 19 22 d5 34 1c 05 |0D. g ...?.".4..|
00000010 07 fc c0 76 75 e0 3d ee 60 89 52 36 0a 53 8a 77 |...vu.=.`.R6.S.w|
00000020 af af aa 84 02 20 5e 96 e9 f0 4b 4c 1d dc a3 d2 |..... ^...KL....|
00000030 15 61 d7 fd 60 44 be 91 04 23 5e 97 f0 0f 88 8b |.a..`D...#^.....|
00000040 15 d7 61 81 d4 08 |..a...|
[9508 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9509 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e52110 gate 1582330613145253000 evaluation starts
[950a 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e52110 signed by 0 principal evaluation starts (used [false])
[950b 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e52110 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[950c 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e52110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)
[950d 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e52110 principal evaluation fails
[950e 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e52110 gate 1582330613145253000 evaluation fails
[950f 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers
[9510 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers
[9511 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==
[9512 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4c c2 30 60 0f 46 0c 7d fe ce c5 a6 16 c9 cd 80 |L.0`.F.}........|
00000010 2e 3f d6 53 4a 03 09 ce 2f e0 5d 7e e8 ab 6b 62 |.?.SJ.../.]~..kb|
[9513 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 20 7f b6 da 3f 19 22 d5 34 1c 05 |0D. g ...?.".4..|
00000010 07 fc c0 76 75 e0 3d ee 60 89 52 36 0a 53 8a 77 |...vu.=.`.R6.S.w|
00000020 af af aa 84 02 20 5e 96 e9 f0 4b 4c 1d dc a3 d2 |..... ^...KL....|
00000030 15 61 d7 fd 60 44 be 91 04 23 5e 97 f0 0f 88 8b |.a..`D...#^.....|
00000040 15 d7 61 81 d4 08 |..a...|
[9514 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9515 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e532f0 gate 1582330613148527300 evaluation starts
[9516 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e532f0 signed by 0 principal evaluation starts (used [false])
[9517 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e532f0 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[9518 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e532f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)
[9519 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e532f0 principal evaluation fails
[951a 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e532f0 gate 1582330613148527300 evaluation fails
[951b 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers
[951c 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers
[951d 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==
[951e 02-22 00:16:53.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4c c2 30 60 0f 46 0c 7d fe ce c5 a6 16 c9 cd 80 |L.0`.F.}........|
00000010 2e 3f d6 53 4a 03 09 ce 2f e0 5d 7e e8 ab 6b 62 |.?.SJ.../.]~..kb|
[951f 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 20 7f b6 da 3f 19 22 d5 34 1c 05 |0D. g ...?.".4..|
00000010 07 fc c0 76 75 e0 3d ee 60 89 52 36 0a 53 8a 77 |...vu.=.`.R6.S.w|
00000020 af af aa 84 02 20 5e 96 e9 f0 4b 4c 1d dc a3 d2 |..... ^...KL....|
00000030 15 61 d7 fd 60 44 be 91 04 23 5e 97 f0 0f 88 8b |.a..`D...#^.....|
00000040 15 d7 61 81 d4 08 |..a...|
[9520 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU signature for identity 0 validated
[9521 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e53c10 gate 1582330613150962700 evaluation starts
[9522 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e53c10 signed by 0 principal evaluation starts (used [false])
[9523 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e53c10 processing identity 0 - &{Org1MSP 1d2132730eb675c3a1bb36be2c8a5a5f73c535f8e991cade282a0b07c1997afa}
[9524 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP
[9525 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity
[9526 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain
[9527 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e53c10 principal evaluation succeeds for identity 0
[9528 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e53c10 gate 1582330613150962700 evaluation succeeds
[9529 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers
[952a 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers
[952b 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers
[952c 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.ImplicitMetaPolicy Policy /Channel/Application/Readers
[952d 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU [3106125b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready
[952e 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU [3106125b] notifying Txid:3106125b0a61d416d8a330fc68d2809b02e7e663651ac9a7f58ad682ab6af7f8, channelID:
[952f 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exit
[9530 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> INFO finished chaincode: qscc duration: 15ms channel= txID=3106125b
[9531 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45122 grpc.code=OK grpc.call_duration=19.7793ms
[9532 02-22 00:16:53.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing"
[9533 02-22 00:16:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s